{"aix": [{"lastseen": "2021-03-17T17:27:00", "bulletinFamily": "unix", "cvelist": ["CVE-2020-27221", "CVE-2020-14803", "CVE-2020-14782", "CVE-2020-14781", "CVE-2020-14798", "CVE-2020-14779", "CVE-2020-14797", "CVE-2020-2773", "CVE-2020-14796"], "description": "IBM SECURITY ADVISORY\n\nFirst Issued: Mon Mar 15 10:22:29 CDT 2021\n\nThe most recent version of this document is available here:\n\nhttp://aix.software.ibm.com/aix/efixes/security/java_mar2021_advisory.asc\nhttps://aix.software.ibm.com/aix/efixes/security/java_mar2021_advisory.asc\nftp://aix.software.ibm.com/aix/efixes/security/java_mar2021_advisory.asc\n\nSecurity Bulletin: Multiple vulnerabilities in IBM Java SDK affect AIX\n\n===============================================================================\n\nSUMMARY:\n\n There are multiple vulnerabilities in IBM SDK Java Technology Edition,\n Versions 7, 7.1, 8 used by AIX. AIX has addressed the applicable CVEs.\n\n\n===============================================================================\n\nVULNERABILITY DETAILS:\n\n CVEID: CVE-2020-14779\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779\n DESCRIPTION: An unspecified vulnerability in Java SE related to the\n Serialization component could allow an unauthenticated attacker to\n cause a denial of service resulting in a low availability impact using\n unknown attack vectors.\n CVSS Base Score: 3.7\n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/190097\n for the current score\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\n CVEID: CVE-2020-14796\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796\n DESCRIPTION: An unspecified vulnerability in Java SE related to the\n Libraries component could allow an unauthenticated attacker to obtain\n sensitive information resulting in a low confidentiality impact using\n unknown attack vectors.\n CVSS Base Score: 3.1\n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/190114\n for the current score\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)\n\n CVEID: CVE-2020-14797\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797\n DESCRIPTION: An unspecified vulnerability in Java SE related to the\n Libraries component could allow an unauthenticated attacker to cause no\n confidentiality impact, low integrity impact, and no availability\n impact.\n CVSS Base Score: 3.7\n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/190115\n for the current score\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\n CVEID: CVE-2020-14798\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798\n DESCRIPTION: An unspecified vulnerability in Java SE related to the\n Libraries component could allow an unauthenticated attacker to cause no\n confidentiality impact, low integrity impact, and no availability\n impact.\n CVSS Base Score: 3.1\n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/190116\n for the current score\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\n CVEID: CVE-2020-14782\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782\n DESCRIPTION: An unspecified vulnerability in Java SE related to the\n Libraries component could allow an unauthenticated attacker to cause no\n confidentiality impact, low integrity impact, and no availability\n impact.\n CVSS Base Score: 3.7\n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/190100\n for the current score\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\n CVEID: CVE-2020-2773\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773\n DESCRIPTION: An unspecified vulnerability in Java SE related to the Java SE\n Security component could allow an unauthenticated attacker to cause a\n denial of service resulting in a low availability impact using unknown\n attack vectors.\n CVSS Base Score: 3.7\n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/179673\n for the current score\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\n CVEID: CVE-2020-14803\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803\n DESCRIPTION: An unspecified vulnerability in Java SE could allow an\n unauthenticated attacker to obtain sensitive information resulting in\n a low confidentiality impact using unknown attack vectors.\n CVSS Base Score: 5.3\n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/190121\n for the current score\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\n CVEID: CVE-2020-27221\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27221\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27221\n DESCRIPTION: Eclipse OpenJ9 is vulnerable to a stack-based buffer overflow\n when the virtual machine or JNI natives are converting from UTF-8\n characters to platform encoding. By sending an overly long string, a\n remote attacker could overflow a buffer and execute arbitrary code on\n the system or cause the application to crash.\n CVSS Base Score: 9.8\n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/195353\n for the current score\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\n CVEID: CVE-2020-14781\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781\n DESCRIPTION: An unspecified vulnerability in Java SE related to the JNDI\n component could allow an unauthenticated attacker to obtain sensitive\n information resulting in a low confidentiality impact using unknown\n attack vectors.\n CVSS Base Score: 3.7\n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/190099\n for the current score\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\n\nAFFECTED PRODUCTS AND VERSIONS:\n\n AIX 7.1, 7.2\n VIOS 3.1\n\n The following fileset levels (VRMF) are vulnerable, if the\n respective Java version is installed:\n For Java7: Less than 7.0.0.680\n For Java7.1: Less than 7.1.0.480\n For Java8: Less than 8.0.0.625\n\n Note: To find out whether the affected Java filesets are installed\n on your systems, refer to the lslpp command found in AIX user's guide.\n\n Example: lslpp -L | grep -i java\n\n\nREMEDIATION:\n\n Note: Recommended remediation is to always install the most recent\n Java package available for the respective Java version.\n\n IBM SDK, Java Technology Edition, Version 7 Service Refresh 10 Fix\n Pack 80 and subsequent releases:\n 32-bit: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=7.0.0.0&platform=AIX+32-bit,+pSeries&function=all\n 64-bit: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=7.0.0.0&platform=AIX+64-bit,+pSeries&function=all\n\n IBM SDK, Java Technology Edition, Version 7R1 Service Refresh 4 Fix\n Pack 80 and subsequent releases:\n 32-bit: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=7.1.0.0&platform=AIX+32-bit,+pSeries&function=all\n 64-bit: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=7.1.0.0&platform=AIX+64-bit,+pSeries&function=all\n\n IBM SDK, Java Technology Edition, Version 8 Service Refresh 6 Fix\n Pack 25 and subsequent releases:\n 32-bit: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0&platform=AIX+32-bit,+pSeries&function=all\n 64-bit: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0&platform=AIX+64-bit,+pSeries&function=all\n\n\nWORKAROUNDS AND MITIGATIONS:\n\n None.\n\n\n===============================================================================\n\nCONTACT US:\n\n If you would like to receive AIX Security Advisories via email,\n please visit \"My Notifications\":\n\n http://www.ibm.com/support/mynotifications\n\n To view previously issued advisories, please visit:\n\n http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq\n\n Contact IBM Support for questions related to this announcement:\n\n http://ibm.com/support/\n https://ibm.com/support/\n\n To obtain the OpenSSL public key that can be used to verify the\n signed advisories and ifixes:\n\n Download the key from our web page:\n\n ftp://ftp.software.ibm.com/systems/power/AIX/systems_p_os_aix_security_pubkey.txt\n\n Please contact your local IBM AIX support center for any\n assistance.\n\n\nREFERENCES:\n\n Complete CVSS v2 Guide:\n http://www.first.org/cvss/v2/guide\n On-line Calculator v2:\n http://nvd.nist.gov/CVSS-v2-Calculator\n Complete CVSS v3 Guide:\n http://www.first.org/cvss/user-guide\n On-line Calculator v3:\n http://www.first.org/cvss/calculator/3.0\n\n\nRELATED INFORMATION:\n\n Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect AIX\n https://www.ibm.com/support/pages/node/6430227\n\n\nACKNOWLEDGEMENTS:\n\n None.\n\nCHANGE HISTORY:\n\n First Issued: Mon Mar 15 10:22:29 CDT 2021\n\n\n===============================================================================\n\n*The CVSS Environment Score is customer environment specific and will\nultimately impact the Overall CVSS Score. Customers can evaluate the impact\nof this vulnerability in their environments by accessing the links in the\nReference section of this Security Bulletin.\n\nDisclaimer\nAccording to the Forum of Incident Response and Security Teams (FIRST), the\nCommon Vulnerability Scoring System (CVSS) is an \"industry open standard\ndesigned to convey vulnerability severity and help to determine urgency and\npriority of response.\" IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY\nOF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS\nFOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT\nOF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n\n", "edition": 1, "modified": "2021-03-15T10:22:29", "published": "2021-03-15T10:22:29", "id": "JAVA_MAR2021_ADVISORY.ASC", "href": "https://aix.software.ibm.com/aix/efixes/security/java_mar2021_advisory.asc", "title": "Multiple vulnerabilities in IBM Java SDK affect AIX", "type": "aix", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-02-25T17:09:31", "description": "According to the versions of the java-1.8.0-openjdk packages\ninstalled, the EulerOS installation on the remote host is affected by\nthe following vulnerabilities :\n\n - Vulnerability in the Java SE, Java SE Embedded\n component of Oracle Java SE (subcomponent: Utilities).\n Supported versions that are affected are Java SE:\n 7u221, 8u212, 11.0.3 and 12.0.1 Java SE Embedded:\n 8u211. Easily exploitable vulnerability allows\n unauthenticated attacker with network access via\n multiple protocols to compromise Java SE, Java SE\n Embedded. Successful attacks of this vulnerability can\n result in unauthorized ability to cause a partial\n denial of service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2019-2762)\n\n - Vulnerability in the Java SE, Java SE Embedded\n component of Oracle Java SE (subcomponent: Utilities).\n Supported versions that are affected are Java SE:\n 7u221, 8u212, 11.0.3 and 12.0.1 Java SE Embedded:\n 8u211. Easily exploitable vulnerability allows\n unauthenticated attacker with network access via\n multiple protocols to compromise Java SE, Java SE\n Embedded. Successful attacks of this vulnerability can\n result in unauthorized ability to cause a partial\n denial of service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2019-2769)\n\n - Vulnerability in the Java SE, Java SE Embedded\n component of Oracle Java SE (subcomponent: Security).\n Supported versions that are affected are Java SE:\n 8u212, 11.0.3 and 12.0.1 Java SE Embedded: 8u211.\n Difficult to exploit vulnerability allows\n unauthenticated attacker with network access via\n multiple protocols to compromise Java SE, Java SE\n Embedded. Successful attacks require human interaction\n from a person other than the attacker and while the\n vulnerability is in Java SE, Java SE Embedded, attacks\n may significantly impact additional products.\n Successful attacks of this vulnerability can result in\n unauthorized read access to a subset of Java SE, Java\n SE Embedded accessible data.(CVE-2019-2786)\n\n - Vulnerability in the Java SE component of Oracle Java\n SE (subcomponent: JCE). The supported version that is\n affected is Java SE: 8u212. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE. Successful attacks of this vulnerability can\n result in unauthorized ability to cause a partial\n denial of service (partial DOS) of Java\n SE.(CVE-2019-2842)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: 2D). Supported versions\n that are affected are Java SE: 7u231, 8u221, 11.0.4 and\n 13 Java SE Embedded: 8u221. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2019-2962)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Networking). Supported\n versions that are affected are Java SE: 7u231, 8u221,\n 11.0.4 and 13 Java SE Embedded: 8u221. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks require human interaction from a person other\n than the attacker. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2019-2945)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Concurrency). Supported\n versions that are affected are Java SE: 7u231, 8u221,\n 11.0.4 and 13 Java SE Embedded: 8u221. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2019-2964)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Scripting). Supported\n versions that are affected are Java SE: 8u221, 11.0.4\n and 13 Java SE Embedded: 8u221. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized update, insert\n or delete access to some of Java SE, Java SE Embedded\n accessible data and unauthorized ability to cause a\n partial denial of service (partial DOS) of Java SE,\n Java SE Embedded.(CVE-2019-2975)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Networking). Supported\n versions that are affected are Java SE: 7u231, 8u221,\n 11.0.4 and 13 Java SE Embedded: 8u221. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2019-2978)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: JAXP). Supported versions\n that are affected are Java SE: 7u231, 8u221, 11.0.4 and\n 13 Java SE Embedded: 8u221. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2019-2973)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: JAXP). Supported versions\n that are affected are Java SE: 7u231, 8u221, 11.0.4 and\n 13 Java SE Embedded: 8u221. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2019-2981)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u231, 8u221,\n 11.0.4 and 13 Java SE Embedded: 8u221. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2019-2983)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Kerberos). Supported\n versions that are affected are Java SE: 7u231, 8u221,\n 11.0.4 and 13 Java SE Embedded: 8u221. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via Kerberos to compromise Java SE,\n Java SE Embedded. While the vulnerability is in Java\n SE, Java SE Embedded, attacks may significantly impact\n additional products. Successful attacks of this\n vulnerability can result in unauthorized access to\n critical data or complete access to all Java SE, Java\n SE Embedded accessible data.(CVE-2019-2949)\n\n - Vulnerability in the Java SE product of Oracle Java SE\n (component: 2D). Supported versions that are affected\n are Java SE: 11.0.4 and 13. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE. Successful attacks of this vulnerability can\n result in unauthorized ability to cause a partial\n denial of service (partial DOS) of Java\n SE.(CVE-2019-2987)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: 2D). Supported versions\n that are affected are Java SE: 7u231, 8u221, 11.0.4 and\n 13 Java SE Embedded: 8u221. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2019-2988)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Networking). Supported\n versions that are affected are Java SE: 7u231, 8u221,\n 11.0.4 and 13 Java SE Embedded: 8u221. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. While the\n vulnerability is in Java SE, Java SE Embedded, attacks\n may significantly impact additional products.\n Successful attacks of this vulnerability can result in\n unauthorized creation, deletion or modification access\n to critical data or all Java SE, Java SE Embedded\n accessible data.(CVE-2019-2989)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: 2D). Supported versions\n that are affected are Java SE: 7u231, 8u221, 11.0.4 and\n 13 Java SE Embedded: 8u221. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2019-2992)\n\n - Vulnerability in the Java SE product of Oracle Java SE\n (component: Javadoc). Supported versions that are\n affected are Java SE: 7u231, 8u221, 11.0.4 and 13.\n Difficult to exploit vulnerability allows\n unauthenticated attacker with network access via\n multiple protocols to compromise Java SE. Successful\n attacks require human interaction from a person other\n than the attacker and while the vulnerability is in\n Java SE, attacks may significantly impact additional\n products. Successful attacks of this vulnerability can\n result in unauthorized update, insert or delete access\n to some of Java SE accessible data as well as\n unauthorized read access to a subset of Java SE\n accessible data.(CVE-2019-2999)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u241, 8u231,\n 11.0.5 and 13.0.1 Java SE Embedded: 8u231. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2583)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Security). Supported\n versions that are affected are Java SE: 7u241, 8u231,\n 11.0.5 and 13.0.1 Java SE Embedded: 8u231. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via Kerberos to compromise Java SE,\n Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized update, insert\n or delete access to some of Java SE, Java SE Embedded\n accessible data.(CVE-2020-2590)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u241, 8u231,\n 11.0.5 and 13.0.1 Java SE Embedded: 8u231. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in takeover of\n Java SE, Java SE Embedded.(CVE-2020-2604)\n\n - Vulnerability in the Java SE product of Oracle Java SE\n (component: Libraries). Supported versions that are\n affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1.\n Difficult to exploit vulnerability allows\n unauthenticated attacker with network access via\n multiple protocols to compromise Java SE. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE.(CVE-2020-2654)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Networking). Supported\n versions that are affected are Java SE: 7u241 and 8u231\n Java SE Embedded: 8u231. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2020-2659)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Scripting). Supported\n versions that are affected are Java SE: 8u241, 11.0.6\n and 14 Java SE Embedded: 8u241. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2020-2754)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Scripting). Supported\n versions that are affected are Java SE: 8u241, 11.0.6\n and 14 Java SE Embedded: 8u241. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2020-2755)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u251, 8u241,\n 11.0.6 and 14 Java SE Embedded: 8u241. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2756)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u251, 8u241,\n 11.0.6 and 14 Java SE Embedded: 8u241. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2757)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Security). Supported\n versions that are affected are Java SE: 7u251, 8u241,\n 11.0.6 and 14 Java SE Embedded: 8u241. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2773)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: JSSE). Supported versions\n that are affected are Java SE: 7u251, 8u241, 11.0.6 and\n 14 Java SE Embedded: 8u241. Easily exploitable\n vulnerability allows unauthenticated attacker with\n network access via HTTPS to compromise Java SE, Java SE\n Embedded. Successful attacks of this vulnerability can\n result in unauthorized ability to cause a partial\n denial of service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2781)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Lightweight HTTP Server).\n Supported versions that are affected are Java SE:\n 7u251, 8u241, 11.0.6 and 14 Java SE Embedded: 8u241.\n Difficult to exploit vulnerability allows\n unauthenticated attacker with network access via\n multiple protocols to compromise Java SE, Java SE\n Embedded. Successful attacks of this vulnerability can\n result in unauthorized update, insert or delete access\n to some of Java SE, Java SE Embedded accessible data as\n well as unauthorized read access to a subset of Java\n SE, Java SE Embedded accessible data.(CVE-2020-2800)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Concurrency). Supported\n versions that are affected are Java SE: 7u251, 8u241,\n 11.0.6 and 14 Java SE Embedded: 8u241. Easily\n exploitable vulnerability allows unauthenticated\n attacker with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2830)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Libraries). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks require human interaction from a person other\n than the attacker. Successful attacks of this\n vulnerability can result in unauthorized update, insert\n or delete access to some of Java SE, Java SE Embedded\n accessible data.(CVE-2020-14798)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-14779)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: JNDI). Supported versions\n that are affected are Java SE: 7u271, 8u261, 11.0.8 and\n 15 Java SE Embedded: 8u261. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized read access to\n a subset of Java SE, Java SE Embedded accessible\n data.(CVE-2020-14781)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Hotspot). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks require human interaction from a person other\n than the attacker. Successful attacks of this\n vulnerability can result in unauthorized update, insert\n or delete access to some of Java SE, Java SE Embedded\n accessible data as well as unauthorized read access to\n a subset of Java SE, Java SE Embedded accessible\n data.(CVE-2020-14792)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Libraries). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks require human interaction from a person other\n than the attacker. Successful attacks of this\n vulnerability can result in unauthorized read access to\n a subset of Java SE, Java SE Embedded accessible\n data.(CVE-2020-14796)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Libraries). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized update, insert or delete access to some of\n Java SE, Java SE Embedded accessible\n data.(CVE-2020-14797)\n\n - Vulnerability in the Java SE product of Oracle Java SE\n (component: Libraries). Supported versions that are\n affected are Java SE: 11.0.8 and 15. Easily exploitable\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE. Successful attacks of this vulnerability can\n result in unauthorized read access to a subset of Java\n SE accessible data.(CVE-2020-14803)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Libraries). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized update, insert or delete access to some of\n Java SE, Java SE Embedded accessible\n data.(CVE-2020-14782)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 2, "cvss3": {"score": 8.1, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2021-02-22T00:00:00", "title": "EulerOS 2.0 SP2 : java-1.8.0-openjdk (EulerOS-SA-2021-1310)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-2973", "CVE-2019-2992", "CVE-2019-2842", "CVE-2019-2945", "CVE-2020-2830", "CVE-2020-14803", "CVE-2020-14782", "CVE-2019-2762", "CVE-2020-2781", "CVE-2020-2755", "CVE-2020-2800", "CVE-2019-2983", "CVE-2020-2757", "CVE-2019-2999", "CVE-2020-14792", "CVE-2019-2962", "CVE-2019-2964", "CVE-2020-2590", "CVE-2020-14781", "CVE-2019-2949", "CVE-2020-2604", "CVE-2020-2583", "CVE-2020-14798", "CVE-2020-14779", "CVE-2020-14797", "CVE-2020-2773", "CVE-2019-2769", "CVE-2020-2659", "CVE-2019-2975", "CVE-2019-2988", "CVE-2020-14796", "CVE-2020-2756", "CVE-2019-2981", "CVE-2019-2786", "CVE-2019-2987", "CVE-2019-2989", "CVE-2019-2978", "CVE-2020-2654", "CVE-2020-2754"], "modified": "2021-02-22T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:java-1.8.0-openjdk", "p-cpe:/a:huawei:euleros:java-1.8.0-openjdk-headless", "p-cpe:/a:huawei:euleros:java-1.8.0-openjdk-devel", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2021-1310.NASL", "href": "https://www.tenable.com/plugins/nessus/146641", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(146641);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/24\");\n\n script_cve_id(\n \"CVE-2019-2762\",\n \"CVE-2019-2769\",\n \"CVE-2019-2786\",\n \"CVE-2019-2842\",\n \"CVE-2019-2945\",\n \"CVE-2019-2949\",\n \"CVE-2019-2962\",\n \"CVE-2019-2964\",\n \"CVE-2019-2973\",\n \"CVE-2019-2975\",\n \"CVE-2019-2978\",\n \"CVE-2019-2981\",\n \"CVE-2019-2983\",\n \"CVE-2019-2987\",\n \"CVE-2019-2988\",\n \"CVE-2019-2989\",\n \"CVE-2019-2992\",\n \"CVE-2019-2999\",\n \"CVE-2020-14779\",\n \"CVE-2020-14781\",\n \"CVE-2020-14782\",\n \"CVE-2020-14792\",\n \"CVE-2020-14796\",\n \"CVE-2020-14797\",\n \"CVE-2020-14798\",\n \"CVE-2020-14803\",\n \"CVE-2020-2583\",\n \"CVE-2020-2590\",\n \"CVE-2020-2604\",\n \"CVE-2020-2654\",\n \"CVE-2020-2659\",\n \"CVE-2020-2754\",\n \"CVE-2020-2755\",\n \"CVE-2020-2756\",\n \"CVE-2020-2757\",\n \"CVE-2020-2773\",\n \"CVE-2020-2781\",\n \"CVE-2020-2800\",\n \"CVE-2020-2830\"\n );\n\n script_name(english:\"EulerOS 2.0 SP2 : java-1.8.0-openjdk (EulerOS-SA-2021-1310)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the java-1.8.0-openjdk packages\ninstalled, the EulerOS installation on the remote host is affected by\nthe following vulnerabilities :\n\n - Vulnerability in the Java SE, Java SE Embedded\n component of Oracle Java SE (subcomponent: Utilities).\n Supported versions that are affected are Java SE:\n 7u221, 8u212, 11.0.3 and 12.0.1 Java SE Embedded:\n 8u211. Easily exploitable vulnerability allows\n unauthenticated attacker with network access via\n multiple protocols to compromise Java SE, Java SE\n Embedded. Successful attacks of this vulnerability can\n result in unauthorized ability to cause a partial\n denial of service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2019-2762)\n\n - Vulnerability in the Java SE, Java SE Embedded\n component of Oracle Java SE (subcomponent: Utilities).\n Supported versions that are affected are Java SE:\n 7u221, 8u212, 11.0.3 and 12.0.1 Java SE Embedded:\n 8u211. Easily exploitable vulnerability allows\n unauthenticated attacker with network access via\n multiple protocols to compromise Java SE, Java SE\n Embedded. Successful attacks of this vulnerability can\n result in unauthorized ability to cause a partial\n denial of service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2019-2769)\n\n - Vulnerability in the Java SE, Java SE Embedded\n component of Oracle Java SE (subcomponent: Security).\n Supported versions that are affected are Java SE:\n 8u212, 11.0.3 and 12.0.1 Java SE Embedded: 8u211.\n Difficult to exploit vulnerability allows\n unauthenticated attacker with network access via\n multiple protocols to compromise Java SE, Java SE\n Embedded. Successful attacks require human interaction\n from a person other than the attacker and while the\n vulnerability is in Java SE, Java SE Embedded, attacks\n may significantly impact additional products.\n Successful attacks of this vulnerability can result in\n unauthorized read access to a subset of Java SE, Java\n SE Embedded accessible data.(CVE-2019-2786)\n\n - Vulnerability in the Java SE component of Oracle Java\n SE (subcomponent: JCE). The supported version that is\n affected is Java SE: 8u212. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE. Successful attacks of this vulnerability can\n result in unauthorized ability to cause a partial\n denial of service (partial DOS) of Java\n SE.(CVE-2019-2842)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: 2D). Supported versions\n that are affected are Java SE: 7u231, 8u221, 11.0.4 and\n 13 Java SE Embedded: 8u221. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2019-2962)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Networking). Supported\n versions that are affected are Java SE: 7u231, 8u221,\n 11.0.4 and 13 Java SE Embedded: 8u221. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks require human interaction from a person other\n than the attacker. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2019-2945)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Concurrency). Supported\n versions that are affected are Java SE: 7u231, 8u221,\n 11.0.4 and 13 Java SE Embedded: 8u221. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2019-2964)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Scripting). Supported\n versions that are affected are Java SE: 8u221, 11.0.4\n and 13 Java SE Embedded: 8u221. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized update, insert\n or delete access to some of Java SE, Java SE Embedded\n accessible data and unauthorized ability to cause a\n partial denial of service (partial DOS) of Java SE,\n Java SE Embedded.(CVE-2019-2975)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Networking). Supported\n versions that are affected are Java SE: 7u231, 8u221,\n 11.0.4 and 13 Java SE Embedded: 8u221. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2019-2978)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: JAXP). Supported versions\n that are affected are Java SE: 7u231, 8u221, 11.0.4 and\n 13 Java SE Embedded: 8u221. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2019-2973)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: JAXP). Supported versions\n that are affected are Java SE: 7u231, 8u221, 11.0.4 and\n 13 Java SE Embedded: 8u221. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2019-2981)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u231, 8u221,\n 11.0.4 and 13 Java SE Embedded: 8u221. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2019-2983)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Kerberos). Supported\n versions that are affected are Java SE: 7u231, 8u221,\n 11.0.4 and 13 Java SE Embedded: 8u221. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via Kerberos to compromise Java SE,\n Java SE Embedded. While the vulnerability is in Java\n SE, Java SE Embedded, attacks may significantly impact\n additional products. Successful attacks of this\n vulnerability can result in unauthorized access to\n critical data or complete access to all Java SE, Java\n SE Embedded accessible data.(CVE-2019-2949)\n\n - Vulnerability in the Java SE product of Oracle Java SE\n (component: 2D). Supported versions that are affected\n are Java SE: 11.0.4 and 13. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE. Successful attacks of this vulnerability can\n result in unauthorized ability to cause a partial\n denial of service (partial DOS) of Java\n SE.(CVE-2019-2987)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: 2D). Supported versions\n that are affected are Java SE: 7u231, 8u221, 11.0.4 and\n 13 Java SE Embedded: 8u221. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2019-2988)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Networking). Supported\n versions that are affected are Java SE: 7u231, 8u221,\n 11.0.4 and 13 Java SE Embedded: 8u221. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. While the\n vulnerability is in Java SE, Java SE Embedded, attacks\n may significantly impact additional products.\n Successful attacks of this vulnerability can result in\n unauthorized creation, deletion or modification access\n to critical data or all Java SE, Java SE Embedded\n accessible data.(CVE-2019-2989)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: 2D). Supported versions\n that are affected are Java SE: 7u231, 8u221, 11.0.4 and\n 13 Java SE Embedded: 8u221. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2019-2992)\n\n - Vulnerability in the Java SE product of Oracle Java SE\n (component: Javadoc). Supported versions that are\n affected are Java SE: 7u231, 8u221, 11.0.4 and 13.\n Difficult to exploit vulnerability allows\n unauthenticated attacker with network access via\n multiple protocols to compromise Java SE. Successful\n attacks require human interaction from a person other\n than the attacker and while the vulnerability is in\n Java SE, attacks may significantly impact additional\n products. Successful attacks of this vulnerability can\n result in unauthorized update, insert or delete access\n to some of Java SE accessible data as well as\n unauthorized read access to a subset of Java SE\n accessible data.(CVE-2019-2999)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u241, 8u231,\n 11.0.5 and 13.0.1 Java SE Embedded: 8u231. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2583)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Security). Supported\n versions that are affected are Java SE: 7u241, 8u231,\n 11.0.5 and 13.0.1 Java SE Embedded: 8u231. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via Kerberos to compromise Java SE,\n Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized update, insert\n or delete access to some of Java SE, Java SE Embedded\n accessible data.(CVE-2020-2590)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u241, 8u231,\n 11.0.5 and 13.0.1 Java SE Embedded: 8u231. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in takeover of\n Java SE, Java SE Embedded.(CVE-2020-2604)\n\n - Vulnerability in the Java SE product of Oracle Java SE\n (component: Libraries). Supported versions that are\n affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1.\n Difficult to exploit vulnerability allows\n unauthenticated attacker with network access via\n multiple protocols to compromise Java SE. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE.(CVE-2020-2654)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Networking). Supported\n versions that are affected are Java SE: 7u241 and 8u231\n Java SE Embedded: 8u231. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2020-2659)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Scripting). Supported\n versions that are affected are Java SE: 8u241, 11.0.6\n and 14 Java SE Embedded: 8u241. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2020-2754)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Scripting). Supported\n versions that are affected are Java SE: 8u241, 11.0.6\n and 14 Java SE Embedded: 8u241. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2020-2755)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u251, 8u241,\n 11.0.6 and 14 Java SE Embedded: 8u241. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2756)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u251, 8u241,\n 11.0.6 and 14 Java SE Embedded: 8u241. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2757)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Security). Supported\n versions that are affected are Java SE: 7u251, 8u241,\n 11.0.6 and 14 Java SE Embedded: 8u241. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2773)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: JSSE). Supported versions\n that are affected are Java SE: 7u251, 8u241, 11.0.6 and\n 14 Java SE Embedded: 8u241. Easily exploitable\n vulnerability allows unauthenticated attacker with\n network access via HTTPS to compromise Java SE, Java SE\n Embedded. Successful attacks of this vulnerability can\n result in unauthorized ability to cause a partial\n denial of service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2781)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Lightweight HTTP Server).\n Supported versions that are affected are Java SE:\n 7u251, 8u241, 11.0.6 and 14 Java SE Embedded: 8u241.\n Difficult to exploit vulnerability allows\n unauthenticated attacker with network access via\n multiple protocols to compromise Java SE, Java SE\n Embedded. Successful attacks of this vulnerability can\n result in unauthorized update, insert or delete access\n to some of Java SE, Java SE Embedded accessible data as\n well as unauthorized read access to a subset of Java\n SE, Java SE Embedded accessible data.(CVE-2020-2800)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Concurrency). Supported\n versions that are affected are Java SE: 7u251, 8u241,\n 11.0.6 and 14 Java SE Embedded: 8u241. Easily\n exploitable vulnerability allows unauthenticated\n attacker with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2830)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Libraries). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks require human interaction from a person other\n than the attacker. Successful attacks of this\n vulnerability can result in unauthorized update, insert\n or delete access to some of Java SE, Java SE Embedded\n accessible data.(CVE-2020-14798)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-14779)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: JNDI). Supported versions\n that are affected are Java SE: 7u271, 8u261, 11.0.8 and\n 15 Java SE Embedded: 8u261. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized read access to\n a subset of Java SE, Java SE Embedded accessible\n data.(CVE-2020-14781)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Hotspot). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks require human interaction from a person other\n than the attacker. Successful attacks of this\n vulnerability can result in unauthorized update, insert\n or delete access to some of Java SE, Java SE Embedded\n accessible data as well as unauthorized read access to\n a subset of Java SE, Java SE Embedded accessible\n data.(CVE-2020-14792)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Libraries). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks require human interaction from a person other\n than the attacker. Successful attacks of this\n vulnerability can result in unauthorized read access to\n a subset of Java SE, Java SE Embedded accessible\n data.(CVE-2020-14796)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Libraries). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized update, insert or delete access to some of\n Java SE, Java SE Embedded accessible\n data.(CVE-2020-14797)\n\n - Vulnerability in the Java SE product of Oracle Java SE\n (component: Libraries). Supported versions that are\n affected are Java SE: 11.0.8 and 15. Easily exploitable\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE. Successful attacks of this vulnerability can\n result in unauthorized read access to a subset of Java\n SE accessible data.(CVE-2020-14803)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Libraries). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized update, insert or delete access to some of\n Java SE, Java SE Embedded accessible\n data.(CVE-2020-14782)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-1310\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fa787a18\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected java-1.8.0-openjdk packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/02/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/02/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:java-1.8.0-openjdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:java-1.8.0-openjdk-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:java-1.8.0-openjdk-headless\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(2)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"java-1.8.0-openjdk-1.8.0.191.b12-0.h15\",\n \"java-1.8.0-openjdk-devel-1.8.0.191.b12-0.h15\",\n \"java-1.8.0-openjdk-headless-1.8.0.191.b12-0.h15\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"2\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1.8.0-openjdk\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-29T03:05:19", "description": "The remote host is affected by the vulnerability described in GLSA-202101-19\n(OpenJDK: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in OpenJDK. Please review\n the CVE identifiers referenced below for details.\n \nImpact :\n\n Please review the referenced CVE identifiers for details.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 2, "cvss3": {"score": 8.1, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2021-01-25T00:00:00", "title": "GLSA-202101-19 : OpenJDK: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-14803", "CVE-2020-14782", "CVE-2020-14792", "CVE-2020-2590", "CVE-2020-14781", "CVE-2020-2604", "CVE-2020-2583", "CVE-2020-14798", "CVE-2020-14779", "CVE-2020-2601", "CVE-2020-14797", "CVE-2020-2659", "CVE-2020-2593", "CVE-2020-14796", "CVE-2020-2654"], "modified": "2021-01-25T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:openjdk-bin", "p-cpe:/a:gentoo:linux:openjdk-jre-bin", "p-cpe:/a:gentoo:linux:openjdk"], "id": "GENTOO_GLSA-202101-19.NASL", "href": "https://www.tenable.com/plugins/nessus/145321", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 202101-19.\n#\n# The advisory text is Copyright (C) 2001-2021 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(145321);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/27\");\n\n script_cve_id(\"CVE-2020-14779\", \"CVE-2020-14781\", \"CVE-2020-14782\", \"CVE-2020-14792\", \"CVE-2020-14796\", \"CVE-2020-14797\", \"CVE-2020-14798\", \"CVE-2020-14803\", \"CVE-2020-2583\", \"CVE-2020-2590\", \"CVE-2020-2593\", \"CVE-2020-2601\", \"CVE-2020-2604\", \"CVE-2020-2654\", \"CVE-2020-2659\");\n script_xref(name:\"GLSA\", value:\"202101-19\");\n\n script_name(english:\"GLSA-202101-19 : OpenJDK: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The remote host is affected by the vulnerability described in GLSA-202101-19\n(OpenJDK: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in OpenJDK. Please review\n the CVE identifiers referenced below for details.\n \nImpact :\n\n Please review the referenced CVE identifiers for details.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/202101-19\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"All OpenJDK users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=dev-java/openjdk-8.272_p10'\n All OpenJDK (binary) users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=dev-java/openjdk-bin-8.272_p10'\n All OpenJDK JRE (binary) users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=dev-java/openjdk-jre-bin-8.272_p10'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:openjdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:openjdk-bin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:openjdk-jre-bin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/01/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/25\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"dev-java/openjdk\", unaffected:make_list(\"ge 8.272_p10\"), vulnerable:make_list(\"lt 8.272_p10\"))) flag++;\nif (qpkg_check(package:\"dev-java/openjdk-bin\", unaffected:make_list(\"ge 8.272_p10\"), vulnerable:make_list(\"lt 8.272_p10\"))) flag++;\nif (qpkg_check(package:\"dev-java/openjdk-jre-bin\", unaffected:make_list(\"ge 8.272_p10\"), vulnerable:make_list(\"lt 8.272_p10\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"OpenJDK\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-23T09:06:56", "description": "According to the versions of the java-1.8.0-openjdk packages\ninstalled, the EulerOS installation on the remote host is affected by\nthe following vulnerabilities :\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE Embedded.\n Note: Applies to client and server deployment of Java.\n This vulnerability can be exploited through sandboxed\n Java Web Start applications and sandboxed Java applets.\n It can also be exploited by supplying data to APIs in\n the specified Component without using sandboxed Java\n Web Start applications or sandboxed Java applets, such\n as through a web service.(CVE-2020-14779)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: JNDI). Supported versions\n that are affected are Java SE: 7u271, 8u261, 11.0.8 and\n 15 Java SE Embedded: 8u261. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized read access to\n a subset of Java SE, Java SE Embedded accessible data.\n Note: Applies to client and server deployment of Java.\n This vulnerability can be exploited through sandboxed\n Java Web Start applications and sandboxed Java applets.\n It can also be exploited by supplying data to APIs in\n the specified Component without using sandboxed Java\n Web Start applications or sandboxed Java applets, such\n as through a web service.(CVE-2020-14781)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Hotspot). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks require human interaction from a person other\n than the attacker. Successful attacks of this\n vulnerability can result in unauthorized update, insert\n or delete access to some of Java SE, Java SE Embedded\n accessible data as well as unauthorized read access to\n a subset of Java SE, Java SE Embedded accessible data.\n Note: Applies to client and server deployment of Java.\n This vulnerability can be exploited through sandboxed\n Java Web Start applications and sandboxed Java applets.\n It can also be exploited by supplying data to APIs in\n the specified Component without using sandboxed Java\n Web Start applications or sandboxed Java applets, such\n as through a web service.(CVE-2020-14792)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Libraries). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks require human interaction from a person other\n than the attacker. Successful attacks of this\n vulnerability can result in unauthorized update, insert\n or delete access to some of Java SE, Java SE Embedded\n accessible data. Note: This vulnerability applies to\n Java deployments, typically in clients running\n sandboxed Java Web Start applications or sandboxed Java\n applets, that load and run untrusted code (e.g., code\n that comes from the internet) and rely on the Java\n sandbox for security. This vulnerability does not apply\n to Java deployments, typically in servers, that load\n and run only trusted code (e.g., code installed by an\n administrator).(CVE-2020-14798)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Libraries). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized update, insert or delete access to some of\n Java SE, Java SE Embedded accessible data. Note:\n Applies to client and server deployment of Java. This\n vulnerability can be exploited through sandboxed Java\n Web Start applications and sandboxed Java applets. It\n can also be exploited by supplying data to APIs in the\n specified Component without using sandboxed Java Web\n Start applications or sandboxed Java applets, such as\n through a web service.(CVE-2020-14782)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Libraries). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks require human interaction from a person other\n than the attacker. Successful attacks of this\n vulnerability can result in unauthorized read access to\n a subset of Java SE, Java SE Embedded accessible data.\n Note: This vulnerability applies to Java deployments,\n typically in clients running sandboxed Java Web Start\n applications or sandboxed Java applets, that load and\n run untrusted code (e.g., code that comes from the\n internet) and rely on the Java sandbox for security.\n This vulnerability does not apply to Java deployments,\n typically in servers, that load and run only trusted\n code (e.g., code installed by an\n administrator).(CVE-2020-14796)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Libraries). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized update, insert or delete access to some of\n Java SE, Java SE Embedded accessible data. Note:\n Applies to client and server deployment of Java. This\n vulnerability can be exploited through sandboxed Java\n Web Start applications and sandboxed Java applets. It\n can also be exploited by supplying data to APIs in the\n specified Component without using sandboxed Java Web\n Start applications or sandboxed Java applets, such as\n through a web service.(CVE-2020-14797)\n\n - Vulnerability in the Java SE product of Oracle Java SE\n (component: Libraries). Supported versions that are\n affected are Java SE: 11.0.8 and 15. Easily exploitable\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE. Successful attacks of this vulnerability can\n result in unauthorized read access to a subset of Java\n SE accessible data. Note: This vulnerability applies to\n Java deployments, typically in clients running\n sandboxed Java Web Start applications or sandboxed Java\n applets, that load and run untrusted code (e.g., code\n that comes from the internet) and rely on the Java\n sandbox for security. This vulnerability does not apply\n to Java deployments, typically in servers, that load\n and run only trusted code (e.g., code installed by an\n administrator).(CVE-2020-14803)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Scripting). Supported\n versions that are affected are Java SE: 8u241, 11.0.6\n and 14 Java SE Embedded: 8u241. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2020-2754)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Scripting). Supported\n versions that are affected are Java SE: 8u241, 11.0.6\n and 14 Java SE Embedded: 8u241. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2020-2755)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u251, 8u241,\n 11.0.6 and 14 Java SE Embedded: 8u241. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2756)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u251, 8u241,\n 11.0.6 and 14 Java SE Embedded: 8u241. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2757)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Security). Supported\n versions that are affected are Java SE: 7u251, 8u241,\n 11.0.6 and 14 Java SE Embedded: 8u241. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2773)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: JSSE). Supported versions\n that are affected are Java SE: 7u251, 8u241, 11.0.6 and\n 14 Java SE Embedded: 8u241. Easily exploitable\n vulnerability allows unauthenticated attacker with\n network access via HTTPS to compromise Java SE, Java SE\n Embedded. Successful attacks of this vulnerability can\n result in unauthorized ability to cause a partial\n denial of service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2781)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Lightweight HTTP Server).\n Supported versions that are affected are Java SE:\n 7u251, 8u241, 11.0.6 and 14 Java SE Embedded: 8u241.\n Difficult to exploit vulnerability allows\n unauthenticated attacker with network access via\n multiple protocols to compromise Java SE, Java SE\n Embedded. Successful attacks of this vulnerability can\n result in unauthorized update, insert or delete access\n to some of Java SE, Java SE Embedded accessible data as\n well as unauthorized read access to a subset of Java\n SE, Java SE Embedded accessible data.(CVE-2020-2800)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Concurrency). Supported\n versions that are affected are Java SE: 7u251, 8u241,\n 11.0.6 and 14 Java SE Embedded: 8u241. Easily\n exploitable vulnerability allows unauthenticated\n attacker with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2830)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: 2D). Supported versions\n that are affected are Java SE: 8u251, 11.0.7 and 14.0.1\n Java SE Embedded: 8u251. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized read access to\n a subset of Java SE, Java SE Embedded accessible\n data.(CVE-2020-14581)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 2, "cvss3": {"score": 4.8, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}, "published": "2021-01-20T00:00:00", "title": "EulerOS 2.0 SP3 : java-1.8.0-openjdk (EulerOS-SA-2021-1078)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-2830", "CVE-2020-14803", "CVE-2020-14782", "CVE-2020-2781", "CVE-2020-2755", "CVE-2020-2800", "CVE-2020-2757", "CVE-2020-14792", "CVE-2020-14781", "CVE-2020-14798", "CVE-2020-14779", "CVE-2020-14797", "CVE-2020-2773", "CVE-2020-14796", "CVE-2020-2756", "CVE-2020-14581", "CVE-2020-2754"], "modified": "2021-01-20T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:java-1.8.0-openjdk", "p-cpe:/a:huawei:euleros:java-1.8.0-openjdk-headless", "p-cpe:/a:huawei:euleros:java-1.8.0-openjdk-devel", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2021-1078.NASL", "href": "https://www.tenable.com/plugins/nessus/145111", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(145111);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/22\");\n\n script_cve_id(\n \"CVE-2020-14581\",\n \"CVE-2020-14779\",\n \"CVE-2020-14781\",\n \"CVE-2020-14782\",\n \"CVE-2020-14792\",\n \"CVE-2020-14796\",\n \"CVE-2020-14797\",\n \"CVE-2020-14798\",\n \"CVE-2020-14803\",\n \"CVE-2020-2754\",\n \"CVE-2020-2755\",\n \"CVE-2020-2756\",\n \"CVE-2020-2757\",\n \"CVE-2020-2773\",\n \"CVE-2020-2781\",\n \"CVE-2020-2800\",\n \"CVE-2020-2830\"\n );\n\n script_name(english:\"EulerOS 2.0 SP3 : java-1.8.0-openjdk (EulerOS-SA-2021-1078)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the java-1.8.0-openjdk packages\ninstalled, the EulerOS installation on the remote host is affected by\nthe following vulnerabilities :\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE Embedded.\n Note: Applies to client and server deployment of Java.\n This vulnerability can be exploited through sandboxed\n Java Web Start applications and sandboxed Java applets.\n It can also be exploited by supplying data to APIs in\n the specified Component without using sandboxed Java\n Web Start applications or sandboxed Java applets, such\n as through a web service.(CVE-2020-14779)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: JNDI). Supported versions\n that are affected are Java SE: 7u271, 8u261, 11.0.8 and\n 15 Java SE Embedded: 8u261. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized read access to\n a subset of Java SE, Java SE Embedded accessible data.\n Note: Applies to client and server deployment of Java.\n This vulnerability can be exploited through sandboxed\n Java Web Start applications and sandboxed Java applets.\n It can also be exploited by supplying data to APIs in\n the specified Component without using sandboxed Java\n Web Start applications or sandboxed Java applets, such\n as through a web service.(CVE-2020-14781)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Hotspot). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks require human interaction from a person other\n than the attacker. Successful attacks of this\n vulnerability can result in unauthorized update, insert\n or delete access to some of Java SE, Java SE Embedded\n accessible data as well as unauthorized read access to\n a subset of Java SE, Java SE Embedded accessible data.\n Note: Applies to client and server deployment of Java.\n This vulnerability can be exploited through sandboxed\n Java Web Start applications and sandboxed Java applets.\n It can also be exploited by supplying data to APIs in\n the specified Component without using sandboxed Java\n Web Start applications or sandboxed Java applets, such\n as through a web service.(CVE-2020-14792)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Libraries). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks require human interaction from a person other\n than the attacker. Successful attacks of this\n vulnerability can result in unauthorized update, insert\n or delete access to some of Java SE, Java SE Embedded\n accessible data. Note: This vulnerability applies to\n Java deployments, typically in clients running\n sandboxed Java Web Start applications or sandboxed Java\n applets, that load and run untrusted code (e.g., code\n that comes from the internet) and rely on the Java\n sandbox for security. This vulnerability does not apply\n to Java deployments, typically in servers, that load\n and run only trusted code (e.g., code installed by an\n administrator).(CVE-2020-14798)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Libraries). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized update, insert or delete access to some of\n Java SE, Java SE Embedded accessible data. Note:\n Applies to client and server deployment of Java. This\n vulnerability can be exploited through sandboxed Java\n Web Start applications and sandboxed Java applets. It\n can also be exploited by supplying data to APIs in the\n specified Component without using sandboxed Java Web\n Start applications or sandboxed Java applets, such as\n through a web service.(CVE-2020-14782)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Libraries). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks require human interaction from a person other\n than the attacker. Successful attacks of this\n vulnerability can result in unauthorized read access to\n a subset of Java SE, Java SE Embedded accessible data.\n Note: This vulnerability applies to Java deployments,\n typically in clients running sandboxed Java Web Start\n applications or sandboxed Java applets, that load and\n run untrusted code (e.g., code that comes from the\n internet) and rely on the Java sandbox for security.\n This vulnerability does not apply to Java deployments,\n typically in servers, that load and run only trusted\n code (e.g., code installed by an\n administrator).(CVE-2020-14796)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Libraries). Supported\n versions that are affected are Java SE: 7u271, 8u261,\n 11.0.8 and 15 Java SE Embedded: 8u261. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized update, insert or delete access to some of\n Java SE, Java SE Embedded accessible data. Note:\n Applies to client and server deployment of Java. This\n vulnerability can be exploited through sandboxed Java\n Web Start applications and sandboxed Java applets. It\n can also be exploited by supplying data to APIs in the\n specified Component without using sandboxed Java Web\n Start applications or sandboxed Java applets, such as\n through a web service.(CVE-2020-14797)\n\n - Vulnerability in the Java SE product of Oracle Java SE\n (component: Libraries). Supported versions that are\n affected are Java SE: 11.0.8 and 15. Easily exploitable\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE. Successful attacks of this vulnerability can\n result in unauthorized read access to a subset of Java\n SE accessible data. Note: This vulnerability applies to\n Java deployments, typically in clients running\n sandboxed Java Web Start applications or sandboxed Java\n applets, that load and run untrusted code (e.g., code\n that comes from the internet) and rely on the Java\n sandbox for security. This vulnerability does not apply\n to Java deployments, typically in servers, that load\n and run only trusted code (e.g., code installed by an\n administrator).(CVE-2020-14803)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Scripting). Supported\n versions that are affected are Java SE: 8u241, 11.0.6\n and 14 Java SE Embedded: 8u241. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2020-2754)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Scripting). Supported\n versions that are affected are Java SE: 8u241, 11.0.6\n and 14 Java SE Embedded: 8u241. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized ability to\n cause a partial denial of service (partial DOS) of Java\n SE, Java SE Embedded.(CVE-2020-2755)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u251, 8u241,\n 11.0.6 and 14 Java SE Embedded: 8u241. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2756)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Serialization). Supported\n versions that are affected are Java SE: 7u251, 8u241,\n 11.0.6 and 14 Java SE Embedded: 8u241. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2757)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Security). Supported\n versions that are affected are Java SE: 7u251, 8u241,\n 11.0.6 and 14 Java SE Embedded: 8u241. Difficult to\n exploit vulnerability allows unauthenticated attacker\n with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2773)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: JSSE). Supported versions\n that are affected are Java SE: 7u251, 8u241, 11.0.6 and\n 14 Java SE Embedded: 8u241. Easily exploitable\n vulnerability allows unauthenticated attacker with\n network access via HTTPS to compromise Java SE, Java SE\n Embedded. Successful attacks of this vulnerability can\n result in unauthorized ability to cause a partial\n denial of service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2781)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Lightweight HTTP Server).\n Supported versions that are affected are Java SE:\n 7u251, 8u241, 11.0.6 and 14 Java SE Embedded: 8u241.\n Difficult to exploit vulnerability allows\n unauthenticated attacker with network access via\n multiple protocols to compromise Java SE, Java SE\n Embedded. Successful attacks of this vulnerability can\n result in unauthorized update, insert or delete access\n to some of Java SE, Java SE Embedded accessible data as\n well as unauthorized read access to a subset of Java\n SE, Java SE Embedded accessible data.(CVE-2020-2800)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: Concurrency). Supported\n versions that are affected are Java SE: 7u251, 8u241,\n 11.0.6 and 14 Java SE Embedded: 8u241. Easily\n exploitable vulnerability allows unauthenticated\n attacker with network access via multiple protocols to\n compromise Java SE, Java SE Embedded. Successful\n attacks of this vulnerability can result in\n unauthorized ability to cause a partial denial of\n service (partial DOS) of Java SE, Java SE\n Embedded.(CVE-2020-2830)\n\n - Vulnerability in the Java SE, Java SE Embedded product\n of Oracle Java SE (component: 2D). Supported versions\n that are affected are Java SE: 8u251, 11.0.7 and 14.0.1\n Java SE Embedded: 8u251. Difficult to exploit\n vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise\n Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized read access to\n a subset of Java SE, Java SE Embedded accessible\n data.(CVE-2020-14581)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-1078\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?cc613330\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected java-1.8.0-openjdk packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/20\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:java-1.8.0-openjdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:java-1.8.0-openjdk-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:java-1.8.0-openjdk-headless\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(3)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"java-1.8.0-openjdk-1.8.0.191.b12-0.h13\",\n \"java-1.8.0-openjdk-devel-1.8.0.191.b12-0.h13\",\n \"java-1.8.0-openjdk-headless-1.8.0.191.b12-0.h13\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"3\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1.8.0-openjdk\");\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-01-14T06:30:46", "description": "This update for java-1_8_0-ibm fixes the following issues :\n\nUpdate to Java 8.0 Service Refresh 6 Fix Pack 20\n[bsc#1180063,bsc#1177943] CVE-2020-14792 CVE-2020-14797 CVE-2020-14781\nCVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803\n\n - Class libraries :\n\n - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for\n more time that the set timeout\n\n - Z/OS specific C function send_file is changing the file\n pointer position\n\n - Java Virtual Machine :\n\n - Crash on iterate java stack\n\n - Java process hang on SIGTERM\n\n - JIT Compiler :\n\n - JMS performance regression from JDK8 SR5 FP40 TO FP41\n\n - Class Libraries :\n\n - z15 high utilization following Z/VM and Linux migration\n from z14 To z15\n\n - Java Virtual Machine :\n\n - Assertion failed when trying to write a class file\n\n - Assertion failure at modronapi.cpp\n\n - Improve the performance of defining and finding classes\n\n - JIT Compiler :\n\n - An assert in ppcbinaryencoding.cpp may trigger when\n running with traps disabled on power\n\n - AOT field offset off by n bytes\n\n - Segmentation fault in jit module on ibm z platform\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 3, "cvss3": {"score": 4.2, "vector": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}, "published": "2021-01-06T00:00:00", "title": "SUSE SLES12 Security Update : java-1_8_0-ibm (SUSE-SU-2021:0032-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-14803", "CVE-2020-14792", "CVE-2020-14781", "CVE-2020-14798", "CVE-2020-14779", "CVE-2020-14797", "CVE-2020-14796"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-devel", "cpe:/o:novell:suse_linux:12", "p-cpe:/a:novell:suse_linux:java-1_8_0-ibm", "p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-plugin", "p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-alsa"], "id": "SUSE_SU-2021-0032-1.NASL", "href": "https://www.tenable.com/plugins/nessus/144761", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2021:0032-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(144761);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2020-14779\", \"CVE-2020-14781\", \"CVE-2020-14792\", \"CVE-2020-14796\", \"CVE-2020-14797\", \"CVE-2020-14798\", \"CVE-2020-14803\");\n\n script_name(english:\"SUSE SLES12 Security Update : java-1_8_0-ibm (SUSE-SU-2021:0032-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for java-1_8_0-ibm fixes the following issues :\n\nUpdate to Java 8.0 Service Refresh 6 Fix Pack 20\n[bsc#1180063,bsc#1177943] CVE-2020-14792 CVE-2020-14797 CVE-2020-14781\nCVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803\n\n - Class libraries :\n\n - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for\n more time that the set timeout\n\n - Z/OS specific C function send_file is changing the file\n pointer position\n\n - Java Virtual Machine :\n\n - Crash on iterate java stack\n\n - Java process hang on SIGTERM\n\n - JIT Compiler :\n\n - JMS performance regression from JDK8 SR5 FP40 TO FP41\n\n - Class Libraries :\n\n - z15 high utilization following Z/VM and Linux migration\n from z14 To z15\n\n - Java Virtual Machine :\n\n - Assertion failed when trying to write a class file\n\n - Assertion failure at modronapi.cpp\n\n - Improve the performance of defining and finding classes\n\n - JIT Compiler :\n\n - An assert in ppcbinaryencoding.cpp may trigger when\n running with traps disabled on power\n\n - AOT field offset off by n bytes\n\n - Segmentation fault in jit module on ibm z platform\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1177943\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1180063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14779/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14781/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14792/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14796/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14797/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14798/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14803/\"\n );\n # https://www.suse.com/support/update/announcement/2021/suse-su-20210032-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?24a45f64\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud Crowbar 9 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2021-32=1\n\nSUSE OpenStack Cloud Crowbar 8 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2021-32=1\n\nSUSE OpenStack Cloud 9 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-9-2021-32=1\n\nSUSE OpenStack Cloud 8 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-8-2021-32=1\n\nSUSE OpenStack Cloud 7 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-7-2021-32=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP5 :\n\nzypper in -t patch SUSE-SLE-SDK-12-SP5-2021-32=1\n\nSUSE Linux Enterprise Server for SAP 12-SP4 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP4-2021-32=1\n\nSUSE Linux Enterprise Server for SAP 12-SP3 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP3-2021-32=1\n\nSUSE Linux Enterprise Server for SAP 12-SP2 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP2-2021-32=1\n\nSUSE Linux Enterprise Server 12-SP5 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-32=1\n\nSUSE Linux Enterprise Server 12-SP4-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2021-32=1\n\nSUSE Linux Enterprise Server 12-SP3-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP3-2021-32=1\n\nSUSE Linux Enterprise Server 12-SP3-BCL :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2021-32=1\n\nSUSE Linux Enterprise Server 12-SP2-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP2-2021-32=1\n\nSUSE Linux Enterprise Server 12-SP2-BCL :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2021-32=1\n\nSUSE Enterprise Storage 5 :\n\nzypper in -t patch SUSE-Storage-5-2021-32=1\n\nHPE Helion Openstack 8 :\n\nzypper in -t patch HPE-Helion-OpenStack-8-2021-32=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14792\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-ibm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-alsa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/10/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(2|3|4|5)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP2/3/4/5\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"java-1_8_0-ibm-1.8.0_sr6.20-30.78.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"java-1_8_0-ibm-1.8.0_sr6.20-30.78.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"java-1_8_0-ibm-1.8.0_sr6.20-30.78.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-1_8_0-ibm-1.8.0_sr6.20-30.78.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1_8_0-ibm\");\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-01-14T06:30:46", "description": "This update for java-1_7_1-ibm fixes the following issues :\n\nUpdate to Java 7.1 Service Refresh 4 Fix Pack 75 [bsc#1180063,\nbsc#1177943] CVE-2020-14792 CVE-2020-14797 CVE-2020-14782\nCVE-2020-14781 CVE-2020-14779 CVE-2020-14798 CVE-2020-14796\nCVE-2020-14803\n\n - Class Libraries :\n\n - Z/OS specific C function send_file is changing the file\n pointer position\n\n - Security :\n\n - Add the new oracle signer certificate\n\n - Certificate parsing error\n\n - JVM memory growth can be caused by the IBMPKCS11IMPL\n crypto provider\n\n - Remove check for websphere signed jars\n\n - sessionid.hashcode generates too many collisions\n\n - The Java 8 IBM certpath provider does not honor the user\n specified system property for CLR connect timeout\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 3, "cvss3": {"score": 4.2, "vector": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}, "published": "2021-01-05T00:00:00", "title": "SUSE SLES12 Security Update : java-1_7_1-ibm (SUSE-SU-2021:0019-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-14803", "CVE-2020-14782", "CVE-2020-14792", "CVE-2020-14781", "CVE-2020-14798", "CVE-2020-14779", "CVE-2020-14797", "CVE-2020-14796"], "modified": "2021-01-05T00:00:00", "cpe": ["cpe:/o:novell:suse_linux:12", "p-cpe:/a:novell:suse_linux:java-1_7_1-ibm-jdbc", "p-cpe:/a:novell:suse_linux:java-1_7_1-ibm-devel", "p-cpe:/a:novell:suse_linux:java-1_7_1-ibm", "p-cpe:/a:novell:suse_linux:java-1_7_1-ibm-alsa", "p-cpe:/a:novell:suse_linux:java-1_7_1-ibm-plugin"], "id": "SUSE_SU-2021-0019-1.NASL", "href": "https://www.tenable.com/plugins/nessus/144732", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2021:0019-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(144732);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2020-14779\", \"CVE-2020-14781\", \"CVE-2020-14782\", \"CVE-2020-14792\", \"CVE-2020-14796\", \"CVE-2020-14797\", \"CVE-2020-14798\", \"CVE-2020-14803\");\n\n script_name(english:\"SUSE SLES12 Security Update : java-1_7_1-ibm (SUSE-SU-2021:0019-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for java-1_7_1-ibm fixes the following issues :\n\nUpdate to Java 7.1 Service Refresh 4 Fix Pack 75 [bsc#1180063,\nbsc#1177943] CVE-2020-14792 CVE-2020-14797 CVE-2020-14782\nCVE-2020-14781 CVE-2020-14779 CVE-2020-14798 CVE-2020-14796\nCVE-2020-14803\n\n - Class Libraries :\n\n - Z/OS specific C function send_file is changing the file\n pointer position\n\n - Security :\n\n - Add the new oracle signer certificate\n\n - Certificate parsing error\n\n - JVM memory growth can be caused by the IBMPKCS11IMPL\n crypto provider\n\n - Remove check for websphere signed jars\n\n - sessionid.hashcode generates too many collisions\n\n - The Java 8 IBM certpath provider does not honor the user\n specified system property for CLR connect timeout\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1177943\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1180063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14779/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14781/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14782/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14792/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14796/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14797/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14798/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14803/\"\n );\n # https://www.suse.com/support/update/announcement/2021/suse-su-20210019-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b2c2a8f8\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud Crowbar 9 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2021-19=1\n\nSUSE OpenStack Cloud Crowbar 8 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2021-19=1\n\nSUSE OpenStack Cloud 9 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-9-2021-19=1\n\nSUSE OpenStack Cloud 8 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-8-2021-19=1\n\nSUSE OpenStack Cloud 7 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-7-2021-19=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP5 :\n\nzypper in -t patch SUSE-SLE-SDK-12-SP5-2021-19=1\n\nSUSE Linux Enterprise Server for SAP 12-SP4 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP4-2021-19=1\n\nSUSE Linux Enterprise Server for SAP 12-SP3 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP3-2021-19=1\n\nSUSE Linux Enterprise Server for SAP 12-SP2 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP2-2021-19=1\n\nSUSE Linux Enterprise Server 12-SP5 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-19=1\n\nSUSE Linux Enterprise Server 12-SP4-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2021-19=1\n\nSUSE Linux Enterprise Server 12-SP3-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP3-2021-19=1\n\nSUSE Linux Enterprise Server 12-SP3-BCL :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2021-19=1\n\nSUSE Linux Enterprise Server 12-SP2-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP2-2021-19=1\n\nSUSE Linux Enterprise Server 12-SP2-BCL :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2021-19=1\n\nSUSE Enterprise Storage 5 :\n\nzypper in -t patch SUSE-Storage-5-2021-19=1\n\nHPE Helion Openstack 8 :\n\nzypper in -t patch HPE-Helion-OpenStack-8-2021-19=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14792\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_1-ibm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_1-ibm-alsa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_1-ibm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_1-ibm-jdbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_7_1-ibm-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/10/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(2|3|4|5)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP2/3/4/5\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"java-1_7_1-ibm-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"java-1_7_1-ibm-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"java-1_7_1-ibm-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-1_7_1-ibm-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1_7_1-ibm\");\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2020-12-29T07:09:03", "description": "This update for java-1_8_0-ibm fixes the following issues :\n\nUpdate to Java 8.0 Service Refresh 6 Fix Pack 20\n[bsc#1180063,bsc#1177943] CVE-2020-14792 CVE-2020-14797 CVE-2020-14781\nCVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803\n\n - Class libraries :\n\n - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for\n more time that the set timeout\n\n - Z/OS specific C function send_file is changing the file\n pointer position\n\n - Java Virtual Machine :\n\n - Crash on iterate java stack\n\n - Java process hang on SIGTERM\n\n - JIT Compiler :\n\n - JMS performance regression from JDK8 SR5 FP40 TO FP41\n\n - Class Libraries :\n\n - z15 high utilization following Z/VM and Linux migration\n from z14 To z15\n\n - Java Virtual Machine :\n\n - Assertion failed when trying to write a class file\n\n - Assertion failure at modronapi.cpp\n\n - Improve the performance of defining and finding classes\n\n - JIT Compiler :\n\n - An assert in ppcbinaryencoding.cpp may trigger when\n running with traps disabled on power\n\n - AOT field offset off by n bytes\n\n - Segmentation fault in jit module on ibm z platform\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 2, "cvss3": {"score": 4.2, "vector": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}, "published": "2020-12-24T00:00:00", "title": "SUSE SLES15 Security Update : java-1_8_0-ibm (SUSE-SU-2020:3932-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-14803", "CVE-2020-14792", "CVE-2020-14781", "CVE-2020-14798", "CVE-2020-14779", "CVE-2020-14797", "CVE-2020-14796"], "modified": "2020-12-24T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-devel", "cpe:/o:novell:suse_linux:15", "p-cpe:/a:novell:suse_linux:java-1_8_0-ibm", "p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-plugin", "p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-alsa"], "id": "SUSE_SU-2020-3932-1.NASL", "href": "https://www.tenable.com/plugins/nessus/144599", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:3932-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(144599);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/12/28\");\n\n script_cve_id(\"CVE-2020-14779\", \"CVE-2020-14781\", \"CVE-2020-14792\", \"CVE-2020-14796\", \"CVE-2020-14797\", \"CVE-2020-14798\", \"CVE-2020-14803\");\n\n script_name(english:\"SUSE SLES15 Security Update : java-1_8_0-ibm (SUSE-SU-2020:3932-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for java-1_8_0-ibm fixes the following issues :\n\nUpdate to Java 8.0 Service Refresh 6 Fix Pack 20\n[bsc#1180063,bsc#1177943] CVE-2020-14792 CVE-2020-14797 CVE-2020-14781\nCVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803\n\n - Class libraries :\n\n - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for\n more time that the set timeout\n\n - Z/OS specific C function send_file is changing the file\n pointer position\n\n - Java Virtual Machine :\n\n - Crash on iterate java stack\n\n - Java process hang on SIGTERM\n\n - JIT Compiler :\n\n - JMS performance regression from JDK8 SR5 FP40 TO FP41\n\n - Class Libraries :\n\n - z15 high utilization following Z/VM and Linux migration\n from z14 To z15\n\n - Java Virtual Machine :\n\n - Assertion failed when trying to write a class file\n\n - Assertion failure at modronapi.cpp\n\n - Improve the performance of defining and finding classes\n\n - JIT Compiler :\n\n - An assert in ppcbinaryencoding.cpp may trigger when\n running with traps disabled on power\n\n - AOT field offset off by n bytes\n\n - Segmentation fault in jit module on ibm z platform\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1177943\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1180063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14779/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14781/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14792/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14796/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14797/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14798/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14803/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20203932-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c50fcad1\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server for SAP 15 :\n\nzypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2020-3932=1\n\nSUSE Linux Enterprise Server 15-LTSS :\n\nzypper in -t patch SUSE-SLE-Product-SLES-15-2020-3932=1\n\nSUSE Linux Enterprise Module for Legacy Software 15-SP3 :\n\nzypper in -t patch SUSE-SLE-Module-Legacy-15-SP3-2020-3932=1\n\nSUSE Linux Enterprise Module for Legacy Software 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Legacy-15-SP2-2020-3932=1\n\nSUSE Linux Enterprise Module for Legacy Software 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-Legacy-15-SP1-2020-3932=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14792\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-ibm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-alsa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/10/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(0|1|2|3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP0/1/2/3\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-1_8_0-ibm-1.8.0_sr6.20-3.47.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"3\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"3\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"3\", reference:\"java-1_8_0-ibm-1.8.0_sr6.20-3.47.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"3\", reference:\"java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"java-1_8_0-ibm-1.8.0_sr6.20-3.47.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-1_8_0-ibm-1.8.0_sr6.20-3.47.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1_8_0-ibm\");\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2020-12-12T14:48:48", "description": "This update for java-1_8_0-openjdk fixes the following issues :\n\nFix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)',\nintroduced in October 2020 CPU.\n\nUpdate to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,\nbsc#1174157, and October 2020 CPU, bsc#1177943)\n\n - New features\n\n + JDK-8245468: Add TLSv1.3 implementation classes from\n 11.0.7\n\n + PR3796: Allow the number of curves supported to be\n specified\n\n - Security fixes\n\n + JDK-8028431, CVE-2020-14579: NullPointerException in\n DerValue.equals(DerValue)\n\n + JDK-8028591, CVE-2020-14578: NegativeArraySizeException\n in\n sun.security.util.DerInputStream.getUnalignedBitString()\n\n + JDK-8230613: Better ASCII conversions\n\n + JDK-8231800: Better listing of arrays\n\n + JDK-8232014: Expand DTD support\n\n + JDK-8233255: Better Swing Buttons\n\n + JDK-8233624: Enhance JNI linkage\n\n + JDK-8234032: Improve basic calendar services\n\n + JDK-8234042: Better factory production of certificates\n\n + JDK-8234418: Better parsing with CertificateFactory\n\n + JDK-8234836: Improve serialization handling\n\n + JDK-8236191: Enhance OID processing\n\n + JDK-8236196: Improve string pooling\n\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy\n class\n\n + JDK-8237117, CVE-2020-14556: Better ForkJoinPool\n behavior\n\n + JDK-8237592, CVE-2020-14577: Enhance certificate\n verification\n\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n\n + JDK-8237995, CVE-2020-14782: Enhance certificate\n processing\n\n + JDK-8238002, CVE-2020-14581: Better matrix operations\n\n + JDK-8238804: Enhance key handling process\n\n + JDK-8238842: AIOOBE in\n GIFImageReader.initializeStringTable\n\n + JDK-8238843: Enhanced font handing\n\n + JDK-8238920, CVE-2020-14583: Better Buffer support\n\n + JDK-8238925: Enhance WAV file playback\n\n + JDK-8240119, CVE-2020-14593: Less Affine Transformations\n\n + JDK-8240124: Better VM Interning\n\n + JDK-8240482: Improved WAV file playback\n\n + JDK-8241114, CVE-2020-14792: Better range handling\n\n + JDK-8241379: Update JCEKS support\n\n + JDK-8241522: Manifest improved jar headers redux\n\n + JDK-8242136, CVE-2020-14621: Better XML namespace\n handling\n\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n\n + JDK-8243302: Advanced class supports\n\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n\n + JDK-8244479: Further constrain certificates\n\n + JDK-8244955: Additional Fix for JDK-8240124\n\n + JDK-8245407: Enhance zoning of times\n\n + JDK-8245412: Better class definitions\n\n + JDK-8245417: Improve certificate chain handling\n\n + JDK-8248574: Improve jpeg processing\n\n + JDK-8249927: Specify limits of\n jdk.serialProxyInterfaceLimit\n\n + JDK-8253019: Enhanced JPEG decoding\n\n - Import of OpenJDK 8 u262 build 01\n\n + JDK-4949105: Access Bridge lacks html tags parsing\n\n + JDK-8003209: JFR events for network utilization\n\n + JDK-8030680: 292 cleanup from default method code\n assessment\n\n + JDK-8035633: TEST_BUG:\n java/net/NetworkInterface/Equals.java and some tests\n failed on windows intermittently\n\n + JDK-8041626: Shutdown tracing event\n\n + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp\n\n + JDK-8149338: JVM Crash caused by Marlin renderer not\n handling NaN coordinates\n\n + JDK-8151582: (ch) test java/nio/channels/\n /AsyncCloseAndInterrupt.java failing due to 'Connection\n succeeded'\n\n + JDK-8165675: Trace event for thread park has incorrect\n unit for timeout\n\n + JDK-8176182: 4 security tests are not run\n\n + JDK-8178910: Problemlist sample tests\n\n + JDK-8183925: Decouple crash protection from watcher\n thread\n\n + JDK-8191393: Random crashes during cfree+0x1c\n\n + JDK-8195817: JFR.stop should require name of recording\n\n + JDK-8195818: JFR.start should increase autogenerated\n name by one\n\n + JDK-8195819: Remove recording=x from jcmd JFR.check\n output\n\n + JDK-8199712: Flight Recorder\n\n + JDK-8202578: Revisit location for class unload events\n\n + JDK-8202835: jfr/event/os/TestSystemProcess.java fails\n on missing events\n\n + JDK-8203287: Zero fails to build after JDK-8199712\n (Flight Recorder)\n\n + JDK-8203346: JFR: Inconsistent signature of\n jfr_add_string_constant\n\n + JDK-8203664: JFR start failure after AppCDS archive\n created with JFR StartFlightRecording\n\n + JDK-8203921: JFR thread sampling is missing fixes from\n JDK-8194552\n\n + JDK-8203929: Limit amount of data for JFR.dump\n\n + JDK-8205516: JFR tool\n\n + JDK-8207392: [PPC64] Implement JFR profiling\n\n + JDK-8207829: FlightRecorderMXBeanImpl is leaking the\n first classloader which calls it\n\n + JDK-8209960: -Xlog:jfr* doesn't work with the JFR\n\n + JDK-8210024: JFR calls virtual is_Java_thread from\n ~Thread()\n\n + JDK-8210776: Upgrade X Window System 6.8.2 to the latest\n XWD 1.0.7\n\n + JDK-8211239: Build fails without JFR: empty JFR events\n signatures mismatch\n\n + JDK-8212232: Wrong metadata for the configuration of the\n cutoff for old object sample events\n\n + JDK-8213015: Inconsistent settings between JFR.configure\n and\n\n -XX:FlightRecorderOptions\n\n + JDK-8213421: Line number information for execution\n samples always 0\n\n + JDK-8213617: JFR should record the PID of the recorded\n process\n\n + JDK-8213734: SAXParser.parse(File, ..) does not close\n resources when Exception occurs.\n\n + JDK-8213914: [TESTBUG] Several JFR VM events are not\n covered by tests\n\n + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered\n by test\n\n + JDK-8213966: The ZGC JFR events should be marked as\n experimental\n\n + JDK-8214542: JFR: Old Object Sample event slow on a deep\n heap in debug builds\n\n + JDK-8214750: Unnecessary tags in jfr classes\n\n + JDK-8214896: JFR Tool left files behind\n\n + JDK-8214906: [TESTBUG]\n jfr/event/sampling/TestNative.java fails with\n UnsatisfiedLinkError\n\n + JDK-8214925: JFR tool fails to execute\n\n + JDK-8215175: Inconsistencies in JFR event metadata\n\n + JDK-8215237: jdk.jfr.Recording javadoc does not compile\n\n + JDK-8215284: Reduce noise induced by periodic task\n getFileSize()\n\n + JDK-8215355: Object monitor deadlock with no threads\n holding the monitor (using jemalloc 5.1)\n\n + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails\n\n + JDK-8215771: The jfr tool should pretty print reference\n chains\n\n + JDK-8216064: -XX:StartFlightRecording:settings= doesn't\n work properly\n\n + JDK-8216486: Possibility of integer overflow in\n JfrThreadSampler::run()\n\n + JDK-8216528: test/jdk/java/rmi/transport/\n /runtimeThreadInheritanceLeak/\n /RuntimeThreadInheritanceLeak.java failing with Xcomp\n\n + JDK-8216559: [JFR] Native libraries not correctly parsed\n from /proc/self/maps\n\n + JDK-8216578: Remove unused/obsolete method in JFR code\n\n + JDK-8216995: Clean up JFR command line processing\n\n + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on\n some systems due to process surviving SIGINT\n\n + JDK-8217748: [TESTBUG] Exclude TestSig test case from\n JFR TestShutdownEvent\n\n + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly\n\n + JDK-8223147: JFR Backport\n\n + JDK-8223689: Add JFR Thread Sampling Support\n\n + JDK-8223690: Add JFR BiasedLock Event Support\n\n + JDK-8223691: Add JFR G1 Region Type Change Event Support\n\n + JDK-8223692: Add JFR G1 Heap Summary Event Support\n\n + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:\n invariant\n\n + JDK-8224475: JTextPane does not show images in HTML\n rendering\n\n + JDK-8226253: JAWS reports wrong number of radio buttons\n when buttons are hidden.\n\n + JDK-8226779: [TESTBUG] Test JFR API from Java agent\n\n + JDK-8226892: ActionListeners on JRadioButtons don't get\n notified when selection is changed with arrow keys\n\n + JDK-8227011: Starting a JFR recording in response to\n JVMTI VMInit and / or Java agent premain corrupts memory\n\n + JDK-8227605: Kitchensink fails\n 'assert((((klass)->trace_id() &\n (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))\n failed: invariant'\n\n + JDK-8229366: JFR backport allows unchecked writing to\n memory\n\n + JDK-8229401: Fix JFR code cache test failures\n\n + JDK-8229708: JFR backport code does not initialize\n\n + JDK-8229873: 8229401 broke jdk8u-jfr-incubator\n\n + JDK-8230448: [test] JFRSecurityTestSuite.java is failing\n on Windows\n\n + JDK-8230707: JFR related tests are failing\n\n + JDK-8230782: Robot.createScreenCapture() fails if\n 'awt.robot.gtk' is set to false\n\n + JDK-8230856: Java_java_net_NetworkInterface_getByName0\n on unix misses ReleaseStringUTFChars in early return\n\n + JDK-8230947: TestLookForUntestedEvents.java is failing\n after JDK-8230707\n\n + JDK-8231995: two jtreg tests failed after 8229366 is\n fixed\n\n + JDK-8233623: Add classpath exception to copyright in\n EventHandlerProxyCreator.java file\n\n + JDK-8236002: CSR for JFR backport suggests not leaving\n out the package-info\n\n + JDK-8236008: Some backup files were accidentally left in\n the hotspot tree\n\n + JDK-8236074: Missed package-info\n\n + JDK-8236174: Should update javadoc since tags\n\n + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR\n Backport\n\n + JDK-8238452: Keytool generates wrong expiration date if\n validity is set to 2050/01/01\n\n + JDK-8238555: Allow Initialization of SunPKCS11 with NSS\n when there are external FIPS modules in the NSSDB\n\n + JDK-8238589: Necessary code cleanup in JFR for JDK8u\n\n + JDK-8238590: Enable JFR by default during compilation in\n 8u\n\n + JDK-8239055: Wrong implementation of VMState.hasListener\n\n + JDK-8239476: JDK-8238589 broke windows build by moving\n OrderedPair\n\n + JDK-8239479: minimal1 and zero builds are failing\n\n + JDK-8239867: correct over use of INCLUDE_JFR macro\n\n + JDK-8240375: Disable JFR by default for July 2020\n release\n\n + JDK-8241444: Metaspace::_class_vsm not initialized if\n compressed class pointers are disabled\n\n + JDK-8241902: AIX Build broken after integration of\n JDK-8223147 (JFR Backport)\n\n + JDK-8242788: Non-PCH build is broken after JDK-8191393\n\n - Import of OpenJDK 8 u262 build 02\n\n + JDK-8130737: AffineTransformOp can't handle child raster\n with non-zero x-offset\n\n + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st\n annotation in\n java/awt/image/Raster/TestChildRasterOp.java\n\n + JDK-8230926: [macosx] Two apostrophes are entered\n instead of one with 'U.S. International - PC' layout\n\n + JDK-8240576: JVM crashes after transformation in C2\n IdealLoopTree::merge_many_backedges\n\n + JDK-8242883: Incomplete backport of JDK-8078268:\n backport test part\n\n - Import of OpenJDK 8 u262 build 03\n\n + JDK-8037866: Replace the Fun class in tests with lambdas\n\n + JDK-8146612: C2: Precedence edges specification violated\n\n + JDK-8150986: serviceability/sa/jmap-hprof/\n /JMapHProfLargeHeapTest.java failing because expects\n HPROF JAVA PROFILE 1.0.1 file format\n\n + JDK-8229888: (zipfs) Updating an existing zip file does\n not preserve original permissions\n\n + JDK-8230597: Update GIFlib library to the 5.2.1\n\n + JDK-8230769: BufImg_SetupICM add\n ReleasePrimitiveArrayCritical call in early return\n\n + JDK-8233880, PR3798: Support compilers with multi-digit\n major version numbers\n\n + JDK-8239852: java/util/concurrent tests fail with\n\n -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) \nfailed :\n\nverification should have failed\n\n + JDK-8241638: launcher time metrics always report 1 on\n Linux when _JAVA_LAUNCHER_DEBUG set\n\n + JDK-8243059: Build fails when --with-vendor-name\n contains a comma\n\n + JDK-8243474: [TESTBUG] removed three tests of 0 bytes\n\n + JDK-8244461: [JDK 8u] Build fails with glibc 2.32\n\n + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()\n returns wrong result\n\n - Import of OpenJDK 8 u262 build 04\n\n + JDK-8067796: (process) Process.waitFor(timeout, unit)\n doesn't throw NPE if timeout is less than, or equal to\n zero when unit == null\n\n + JDK-8148886: SEGV in\n sun.java2d.marlin.Renderer._endRendering\n\n + JDK-8171934:\n ObjectSizeCalculator.getEffectiveMemoryLayoutSpecificati\n on() does not recognize OpenJDK's HotSpot VM\n\n + JDK-8196969: JTreg Failure:\n serviceability/sa/ClhsdbJstack.java causes NPE\n\n + JDK-8243539: Copyright info (Year) should be updated for\n fix of 8241638\n\n + JDK-8244777: ClassLoaderStats VM Op uses constant hash\n value\n\n - Import of OpenJDK 8 u262 build 05\n\n + JDK-7147060: com/sun/org/apache/xml/internal/security/\n /transforms/ClassLoaderTest.java doesn't run in agentvm\n mode\n\n + JDK-8178374: Problematic ByteBuffer handling in\n CipherSpi.bufferCrypt method\n\n + JDK-8181841: A TSA server returns timestamp with\n precision higher than milliseconds\n\n + JDK-8227269: Slow class loading when running with JDWP\n\n + JDK-8229899: Make java.io.File.isInvalid() less racy\n\n + JDK-8236996: Incorrect Roboto font rendering on Windows\n with subpixel antialiasing\n\n + JDK-8241750: x86_32 build failure after JDK-8227269\n\n + JDK-8244407: JVM crashes after transformation in C2\n IdealLoopTree::split_fall_in\n\n + JDK-8244843: JapanEraNameCompatTest fails\n\n - Import of OpenJDK 8 u262 build 06\n\n + JDK-8246223: Windows build fails after JDK-8227269\n\n - Import of OpenJDK 8 u262 build 07\n\n + JDK-8233197: Invert JvmtiExport::post_vm_initialized()\n and Jfr:on_vm_start() start-up order for correct option\n parsing\n\n + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a\n\n + JDK-8245167: Top package in method profiling shows null\n in JMC\n\n + JDK-8246703: [TESTBUG] Add test for JDK-8233197\n\n - Import of OpenJDK 8 u262 build 08\n\n + JDK-8220293: Deadlock in JFR string pool\n\n + JDK-8225068: Remove DocuSign root certificate that is\n expiring in May 2020\n\n + JDK-8225069: Remove Comodo root certificate that is\n expiring in May 2020\n\n - Import of OpenJDK 8 u262 build 09\n\n + JDK-8248399: Build installs jfr binary when JFR is\n disabled\n\n - Import of OpenJDK 8 u262 build 10\n\n + JDK-8248715: New JavaTimeSupplementary localisation for\n 'in' installed in wrong package\n\n - Import of OpenJDK 8 u265 build 01\n\n + JDK-8249677: Regression in 8u after JDK-8237117: Better\n ForkJoinPool behavior\n\n + JDK-8250546: Expect changed behaviour reported in\n JDK-8249846\n\n - Import of OpenJDK 8 u272 build 01\n\n + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY\n test/compiler/7177917/Test7177917.java\n\n + JDK-8035493: JVMTI PopFrame capability must instruct\n compilers not to prune locals\n\n + JDK-8036088: Replace strtok() with its safe equivalent\n strtok_s() in DefaultProxySelector.c\n\n + JDK-8039082: [TEST_BUG] Test java/awt/dnd/\n /BadSerializationTest/BadSerializationTest.java fails\n\n + JDK-8075774: Small readability and performance\n improvements for zipfs\n\n + JDK-8132206: move ScanTest.java into OpenJDK\n\n + JDK-8132376: Add @requires os.family to the client tests\n with access to internal OS-specific API\n\n + JDK-8132745: minor cleanup of\n java/util/Scanner/ScanTest.java\n\n + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/\n /appletviewer/IOExceptionIfEncodedURLTest/\n /IOExceptionIfEncodedURLTest.sh\n\n + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/\n /MTGraphicsAccessTest.java hangs on Win. 8\n\n + JDK-8151788: NullPointerException from ntlm.Client.type3\n\n + JDK-8151834: Test SmallPrimeExponentP.java times out\n intermittently\n\n + JDK-8153430: jdk regression test MletParserLocaleTest,\n ParserInfiniteLoopTest reduce default timeout\n\n + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary\n public\n\n + JDK-8156169: Some sound tests rarely hangs because of\n incorrect synchronization\n\n + JDK-8165936: Potential Heap buffer overflow when\n seaching timezone info files\n\n + JDK-8166148: Fix for JDK-8165936 broke solaris builds\n\n + JDK-8167300: Scheduling failures during gcm should be\n fatal\n\n + JDK-8167615: Opensource unit/regression tests for\n JavaSound\n\n + JDK-8172012: [TEST_BUG] delays needed in\n javax/swing/JTree/4633594/bug4633594.java\n\n + JDK-8177628: Opensource unit/regression tests for\n ImageIO\n\n + JDK-8183341: Better cleanup for\n javax/imageio/AllowSearch.java\n\n + JDK-8183351: Better cleanup for\n jdk/test/javax/imageio/spi/\n /AppletContextTest/BadPluginConfigurationTest.sh\n\n + JDK-8193137: Nashorn crashes when given an empty script\n file\n\n + JDK-8194298: Add support for per Socket configuration of\n TCP keepalive\n\n + JDK-8198004:\n javax/swing/JFileChooser/6868611/bug6868611.java throws\n error\n\n + JDK-8200313:\n java/awt/Gtk/GtkVersionTest/GtkVersionTest.java fails\n\n + JDK-8210147: adjust some WSAGetLastError usages in\n windows network coding\n\n + JDK-8211714: Need to update vm_version.cpp to recognise\n VS2017 minor versions\n\n + JDK-8214862: assert(proj != __null) at compile.cpp:3251\n\n + JDK-8217606: LdapContext#reconnect always opens a new\n connection\n\n + JDK-8217647: JFR: recordings on 32-bit systems\n unreadable\n\n + JDK-8226697: Several tests which need the @key headful\n keyword are missing it.\n\n + JDK-8229378: jdwp library loader in linker_md.c quietly\n truncates on buffer overflow\n\n + JDK-8230303: JDB hangs when running monitor command\n\n + JDK-8230711: ConnectionGraph::unique_java_object(Node*\n N) return NULL if n is not in the CG\n\n + JDK-8234617: C1: Incorrect result of field load due to\n missing narrowing conversion\n\n + JDK-8235243: handle VS2017 15.9 and VS2019 in\n abstract_vm_version\n\n + JDK-8235325: build failure on Linux after 8235243\n\n + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a\n symlink\n\n + JDK-8237951: CTW: C2 compilation fails with 'malformed\n control flow'\n\n + JDK-8238225: Issues reported after replacing symlink at\n Contents/MacOS/libjli.dylib with binary\n\n + JDK-8239385: KerberosTicket client name refers wrongly\n to sAMAccountName in AD\n\n + JDK-8239819: XToolkit: Misread of screen information\n memory\n\n + JDK-8240295: hs_err elapsed time in seconds is not\n accurate enough\n\n + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system\n property with a security one\n\n + JDK-8242498: Invalid 'sun.awt.TimedWindowEvent' object\n leads to JVM crash\n\n + JDK-8243489: Thread CPU Load event may contain wrong\n data for CPU time under certain conditions\n\n + JDK-8244818: Java2D Queue Flusher crash while moving\n application window to external monitor\n\n + JDK-8246310: Clean commented-out code about ModuleEntry\n and PackageEntry in JFR\n\n + JDK-8246384: Enable JFR by default on supported\n architectures for October 2020 release\n\n + JDK-8248643: Remove extra leading space in JDK-8240295\n 8u backport\n\n + JDK-8249610: Make\n sun.security.krb5.Config.getBooleanObject(String...\n keys) method public\n\n - Import of OpenJDK 8 u272 build 02\n\n + JDK-8023697: failed class resolution reports different\n class name in detail message for the first and\n subsequent times\n\n + JDK-8025886: replace [[ and == bash extensions in\n regtest\n\n + JDK-8046274: Removing dependency on jakarta-regexp\n\n + JDK-8048933: -XX:+TraceExceptions output should include\n the message\n\n + JDK-8076151: [TESTBUG] Test\n java/awt/FontClass/CreateFont/ /fileaccess/FontFile.java\n fails\n\n + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'\n treated by JVM as an equivalent\n\n + JDK-8154313: Generated javadoc scattered all over the\n place\n\n + JDK-8163251: Hard-coded loop limit prevents reading of\n smart card data greater than 8k\n\n + JDK-8173300:\n [TESTBUG]compiler/tiered/NonTieredLevelsTest.java fails\n with compiler.whitebox.SimpleTestCaseHelper(int) must be\n compiled\n\n + JDK-8183349: Better cleanup for jdk/test/javax/imageio/\n /plugins/shared/CanWriteSequence.java and\n WriteAfterAbort.java\n\n + JDK-8191678: [TESTBUG] Add keyword headful in java/awt\n FocusTransitionTest test.\n\n + JDK-8201633: Problems with AES-GCM native acceleration\n\n + JDK-8211049: Second parameter of 'initialize' method is\n not used\n\n + JDK-8219566: JFR did not collect call stacks when\n MaxJavaStackTraceDepth is set to zero\n\n + JDK-8220165: Encryption using GCM results in\n RuntimeException- input length out of bound\n\n + JDK-8220555: JFR tool shows potentially misleading\n message when it cannot access a file\n\n + JDK-8224217: RecordingInfo should use textual\n representation of path\n\n + JDK-8231779: crash\n HeapWord*ParallelScavengeHeap::failed_mem_allocate\n\n + JDK-8238380, PR3798:\n java.base/unix/native/libjava/childproc.c 'multiple\n definition' link errors with GCC10\n\n + JDK-8238386, PR3798: (sctp)\n jdk.sctp/unix/native/libsctp/ /SctpNet.c 'multiple\n definition' link errors with GCC10\n\n + JDK-8238388, PR3798: libj2gss/NativeFunc.o 'multiple\n definition' link errors with GCC10\n\n + JDK-8242556: Cannot load RSASSA-PSS public key with\n non-null params from byte array\n\n + JDK-8250755: Better cleanup for jdk/test/javax/imageio/\n /plugins/shared/CanWriteSequence.java\n\n - Import of OpenJDK 8 u272 build 03\n\n + JDK-6574989: TEST_BUG:\n javax/sound/sampled/Clip/bug5070081.java fails sometimes\n\n + JDK-8148754: C2 loop unrolling fails due to unexpected\n graph shape\n\n + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh\n tests fail with error : revokeall.exe: Permission denied\n\n + JDK-8203357: Container Metrics\n\n + JDK-8209113: Use WeakReference for lastFontStrike for\n created Fonts\n\n + JDK-8216283: Allow shorter method sampling interval than\n 10 ms\n\n + JDK-8221569: JFR tool produces incorrect output when\n both\n\n --categories and --events are specified\n\n + JDK-8233097: Fontmetrics for large Fonts has zero width\n\n + JDK-8248851: CMS: Missing memory fences between free\n chunk check and klass read\n\n + JDK-8250875: Incorrect parameter type for update_number\n in JDK_Version::jdk_update\n\n - Import of OpenJDK 8 u272 build 04\n\n + JDK-8061616: HotspotDiagnosticMXBean.getVMOption()\n throws IllegalArgumentException for flags of type double\n\n + JDK-8177334: Update xmldsig implementation to Apache\n Santuario 2.1.1\n\n + JDK-8217878: ENVELOPING XML signature no longer works in\n JDK 11\n\n + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR\n exception on OpenJDK 11, works 8/9/10\n\n + JDK-8243138: Enhance BaseLdapServer to support starttls\n extended request\n\n - Import of OpenJDK 8 u272 build 05\n\n + JDK-8026236: Add PrimeTest for BigInteger\n\n + JDK-8057003: Large reference arrays cause extremely long\n synchronization times\n\n + JDK-8060721: Test runtime/SharedArchiveFile/\n /LimitSharedSizes.java fails in jdk 9 fcs new\n platforms/compiler\n\n + JDK-8152077: (cal) Calendar.roll does not always roll\n the hours during daylight savings\n\n + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed\n\n + JDK-8211163: UNIX version of Java_java_io_Console_echo\n does not return a clean boolean\n\n + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount\n test in docker container only works with debug JVMs\n\n + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK\n Repo\n\n + JDK-8236645: JDK 8u231 introduces a regression with\n incompatible handling of XML messages\n\n + JDK-8240676: Meet not symmetric failure when running\n lucene on jdk8\n\n + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA\n program\n\n + JDK-8249158: THREAD_START and THREAD_END event posted in\n primordial phase\n\n + JDK-8250627: Use -XX:+/-UseContainerSupport for\n enabling/disabling Java container metrics\n\n + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and\n Solaris builds\n\n + JDK-8252084: Minimal VM fails to bootcycle: undefined\n symbol:\n AgeTableTracer::is_tenuring_distribution_event_enabled\n\n - Import of OpenJDK 8 u272 build 06\n\n + JDK-8064319: Need to enable -XX:+TraceExceptions in\n release builds\n\n + JDK-8080462, PR3801: Update SunPKCS11 provider with\n PKCS11 v2.40 support\n\n + JDK-8160768: Add capability to custom resolve\n host/domain names within the default JNDI LDAP provider\n\n + JDK-8161973:\n PKIXRevocationChecker.getSoftFailExceptions() not\n working\n\n + JDK-8169925, PR3801: PKCS #11 Cryptographic Token\n Interface license\n\n + JDK-8184762: ZapStackSegments should use optimized\n memset\n\n + JDK-8193234: When using -Xcheck:jni an internally\n allocated buffer can leak\n\n + JDK-8219919: RuntimeStub name lost with\n PrintFrameConverterAssembly\n\n + JDK-8220313: [TESTBUG] Update base image for Docker\n testing to OL 7.6\n\n + JDK-8222079: Don't use memset to initialize fields\n decode_env constructor in disassembler.cpp\n\n + JDK-8225695: 32-bit build failures after JDK-8080462\n (Update SunPKCS11 provider with PKCS11 v2.40 support)\n\n + JDK-8226575: OperatingSystemMXBean should be made\n container aware\n\n + JDK-8226809: Circular reference in printed stack trace\n is not correctly indented & ambiguous\n\n + JDK-8228835: Memory leak in PKCS11 provider when using\n AES GCM\n\n + JDK-8233621: Mismatch in jsse.enableMFLNExtension\n property name\n\n + JDK-8238898, PR3801: Missing hash characters for header\n on license file\n\n + JDK-8243320: Add SSL root certificates to Oracle Root CA\n program\n\n + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the\n latest release 1.8.26\n\n + JDK-8245467: Remove 8u TLSv1.2 implementation files\n\n + JDK-8245469: Remove DTLS protocol implementation\n\n + JDK-8245470: Fix JDK8 compatibility issues\n\n + JDK-8245471: Revert JDK-8148188\n\n + JDK-8245472: Backport JDK-8038893 to JDK8\n\n + JDK-8245473: OCSP stapling support\n\n + JDK-8245474: Add TLS_KRB5 cipher suites support\n according to RFC-2712\n\n + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello\n message by default\n\n + JDK-8245477: Adjust TLS tests location\n\n + JDK-8245653: Remove 8u TLS tests\n\n + JDK-8245681: Add TLSv1.3 regression test from 11.0.7\n\n + JDK-8251117: Cannot check P11Key size in P11Cipher and\n P11AEADCipher\n\n + JDK-8251120, PR3793: [8u] HotSpot build assumes\n ENABLE_JFR is set to either true or false\n\n + JDK-8251341: Minimal Java specification change\n\n + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u\n\n - Import of OpenJDK 8 u272 build 07\n\n + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ\n\n - Import of OpenJDK 8 u272 build 08\n\n + JDK-8062947: Fix exception message to correctly\n represent LDAP connection failure\n\n + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java\n failed due to timeout on DeadServerNoTimeoutTest is\n incorrect\n\n + JDK-8252573: 8u: Windows build failed after 8222079\n backport\n\n - Import of OpenJDK 8 u272 build 09\n\n + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :\n Compilation failed\n\n - Import of OpenJDK 8 u272 build 10\n\n + JDK-8254673: Call to JvmtiExport::post_vm_start() was\n removed by the fix for JDK-8249158\n\n + JDK-8254937: Revert JDK-8148854 for 8u272\n\n - Backports\n\n + JDK-8038723, PR3806: Openup some PrinterJob tests\n\n + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when\n JTable contains certain string\n\n + JDK-8058779, PR3805: Faster implementation of\n String.replace(CharSequence, CharSequence)\n\n + JDK-8130125, PR3806: [TEST_BUG] add @modules to the\n several client tests unaffected by the automated bulk\n update\n\n + JDK-8144015, PR3806: [PIT] failures of text layout font\n tests\n\n + JDK-8144023, PR3806: [PIT] failure of text measurements\n in\n javax/swing/text/html/parser/Parser/6836089/bug6836089.j\n ava\n\n + JDK-8144240, PR3806: [macosx][PIT] AIOOB in\n closed/javax/swing/text/GlyphPainter2/6427244/bug6427244\n .java\n\n + JDK-8145542, PR3806: The case failed automatically and\n thrown java.lang.ArrayIndexOutOfBoundsException\n exception\n\n + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception\n when displaying Devanagari text in JEditorPane\n\n + JDK-8152358, PR3800: code and comment cleanups found\n during the hunt for 8077392\n\n + JDK-8152545, PR3804: Use preprocessor instead of\n compiling a program to generate native nio constants\n\n + JDK-8152680, PR3806: Regression in\n GlyphVector.getGlyphCharIndex behaviour\n\n + JDK-8158924, PR3806: Incorrect i18n text document layout\n\n + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for\n javax/swing/text/GlyphPainter2/6427244/bug6427244.java\n\n + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/\n /GetGlyphCharIndexTest.java does not compile\n\n + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/\n /GlyphPainter2/6427244/bug6427244.java - compilation\n failed\n\n + JDK-8191512, PR3806: T2K font rasterizer code removal\n\n + JDK-8191522, PR3806: Remove Bigelow&Holmes Lucida fonts\n from JDK sources\n\n + JDK-8236512, PR3801: PKCS11 Connection closed after\n Cipher.doFinal and NoPadding\n\n + JDK-8254177, PR3809: (tz) Upgrade time-zone data to\n tzdata2020b\n\n - Bug fixes\n\n + PR3798: Fix format-overflow error on GCC 10, caused by\n passing NULL to a '%s' directive\n\n + PR3795: ECDSAUtils for XML digital signatures should\n support the same curve set as the rest of the JDK\n\n + PR3799: Adapt elliptic curve patches to JDK-8245468: Add\n TLSv1.3 implementation classes from 11.0.7\n\n + PR3808: IcedTea does not install the JFR *.jfc files\n\n + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096\n has fixed its use with Shenandoah\n\n + PR3811: Don't attempt to install JFR files when JFR is\n disabled\n\n - Shenandoah\n\n + [backport] 8221435: Shenandoah should not mark through\n weak roots\n\n + [backport] 8221629: Shenandoah: Cleanup class unloading\n logic\n\n + [backport] 8222992: Shenandoah: Pre-evacuate all roots\n\n + [backport] 8223215: Shenandoah: Support verifying subset\n of roots\n\n + [backport] 8223774: Shenandoah: Refactor\n ShenandoahRootProcessor and family\n\n + [backport] 8224210: Shenandoah: Refactor\n ShenandoahRootScanner to support scanning CSet codecache\n roots\n\n + [backport] 8224508: Shenandoah: Need to update thread\n roots in final mark for piggyback ref update cycle\n\n + [backport] 8224579: ResourceMark not declared in\n shenandoahRootProcessor.inline.hpp with\n\n --disable-precompiled-headers\n\n + [backport] 8224679: Shenandoah: Make\n ShenandoahParallelCodeCacheIterator noncopyable\n\n + [backport] 8224751: Shenandoah: Shenandoah Verifier\n should select proper roots according to current GC cycle\n\n + [backport] 8225014: Separate ShenandoahRootScanner\n method for object_iterate\n\n + [backport] 8225216: gc/logging/TestMetaSpaceLog.java\n doesn't work for Shenandoah\n\n + [backport] 8225573: Shenandoah: Enhance\n ShenandoahVerifier to ensure roots to-space invariant\n\n + [backport] 8225590: Shenandoah: Refactor\n ShenandoahClassLoaderDataRoots API\n\n + [backport] 8226413: Shenandoah: Separate root scanner\n for SH::object_iterate()\n\n + [backport] 8230853: Shenandoah: replace leftover\n assert(is_in(...)) with rich asserts\n\n + [backport] 8231198: Shenandoah: heap walking should\n visit all roots most of the time\n\n + [backport] 8231244: Shenandoah: all-roots heap walking\n misses some weak roots\n\n + [backport] 8237632: Shenandoah: accept NULL fwdptr to\n cooperate with JVMTI and JFR\n\n + [backport] 8239786: Shenandoah: print per-cycle\n statistics\n\n + [backport] 8239926: Shenandoah: Shenandoah needs to mark\n nmethod's metadata\n\n + [backport] 8240671: Shenandoah: refactor\n ShenandoahPhaseTimings\n\n + [backport] 8240749: Shenandoah: refactor ShenandoahUtils\n\n + [backport] 8240750: Shenandoah: remove leftover files\n and mentions of ShenandoahAllocTracker\n\n + [backport] 8240868: Shenandoah: remove CM-with-UR\n piggybacking cycles\n\n + [backport] 8240872: Shenandoah: Avoid updating new\n regions from start of evacuation\n\n + [backport] 8240873: Shenandoah: Short-cut arraycopy\n barriers\n\n + [backport] 8240915: Shenandoah: Remove unused fields in\n init mark tasks\n\n + [backport] 8240948: Shenandoah: cleanup\n not-forwarded-objects paths after JDK-8240868\n\n + [backport] 8241007: Shenandoah: remove\n ShenandoahCriticalControlThreadPriority support\n\n + [backport] 8241062: Shenandoah: rich asserts trigger\n 'empty statement' inspection\n\n + [backport] 8241081: Shenandoah: Do not modify\n update-watermark concurrently\n\n + [backport] 8241093: Shenandoah: editorial changes in\n flag descriptions\n\n + [backport] 8241139: Shenandoah: distribute mark-compact\n work exactly to minimize fragmentation\n\n + [backport] 8241142: Shenandoah: should not use parallel\n reference processing with single GC thread\n\n + [backport] 8241351: Shenandoah: fragmentation metrics\n overhaul\n\n + [backport] 8241435: Shenandoah: avoid disabling pacing\n with 'aggressive'\n\n + [backport] 8241520: Shenandoah: simplify region sequence\n numbers handling\n\n + [backport] 8241534: Shenandoah: region status should\n include update watermark\n\n + [backport] 8241574: Shenandoah: remove\n ShenandoahAssertToSpaceClosure\n\n + [backport] 8241583: Shenandoah: turn heap lock asserts\n into macros\n\n + [backport] 8241668: Shenandoah: make\n ShenandoahHeapRegion not derive from ContiguousSpace\n\n + [backport] 8241673: Shenandoah: refactor\n anti-false-sharing padding\n\n + [backport] 8241675: Shenandoah: assert(n->outcnt() > 0)\n at shenandoahSupport.cpp:2858 with\n java/util/Collections/FindSubList.java\n\n + [backport] 8241692: Shenandoah: remove\n ShenandoahHeapRegion::_reserved\n\n + [backport] 8241700: Shenandoah: Fold\n ShenandoahKeepAliveBarrier flag into\n ShenandoahSATBBarrier\n\n + [backport] 8241740: Shenandoah: remove\n ShenandoahHeapRegion::_heap\n\n + [backport] 8241743: Shenandoah: refactor and inline\n ShenandoahHeap::heap()\n\n + [backport] 8241748: Shenandoah: inline MarkingContext\n TAMS methods\n\n + [backport] 8241838: Shenandoah: no need to trash cset\n during final mark\n\n + [backport] 8241841: Shenandoah: ditch one of allocation\n type counters in ShenandoahHeapRegion\n\n + [backport] 8241842: Shenandoah: inline\n ShenandoahHeapRegion::region_number\n\n + [backport] 8241844: Shenandoah: rename\n ShenandoahHeapRegion::region_number\n\n + [backport] 8241845: Shenandoah: align\n ShenandoahHeapRegions to cache lines\n\n + [backport] 8241926: Shenandoah: only print heap changes\n for operations that directly affect it\n\n + [backport] 8241983: Shenandoah: simplify FreeSet logging\n\n + [backport] 8241985: Shenandoah: simplify collectable\n garbage logging\n\n + [backport] 8242040: Shenandoah: print allocation failure\n type\n\n + [backport] 8242041: Shenandoah: adaptive heuristics\n should account evac reserve in free target\n\n + [backport] 8242042: Shenandoah: tune down\n ShenandoahGarbageThreshold\n\n + [backport] 8242054: Shenandoah: New incremental-update\n mode\n\n + [backport] 8242075: Shenandoah: rename\n ShenandoahHeapRegionSize flag\n\n + [backport] 8242082: Shenandoah: Purge Traversal mode\n\n + [backport] 8242083: Shenandoah: split 'Prepare\n Evacuation' tracking into cset/freeset counters\n\n + [backport] 8242089: Shenandoah: per-worker stats should\n be summed up, not averaged\n\n + [backport] 8242101: Shenandoah: coalesce and parallelise\n heap region walks during the pauses\n\n + [backport] 8242114: Shenandoah: remove\n ShenandoahHeapRegion::reset_alloc_metadata_to_shared\n\n + [backport] 8242130: Shenandoah: Simplify\n arraycopy-barrier dispatching\n\n + [backport] 8242211: Shenandoah: remove\n ShenandoahHeuristics::RegionData::_seqnum_last_alloc\n\n + [backport] 8242212: Shenandoah: initialize\n ShenandoahHeuristics::_region_data eagerly\n\n + [backport] 8242213: Shenandoah: remove\n ShenandoahHeuristics::_bytes_in_cset\n\n + [backport] 8242217: Shenandoah: Enable GC mode to be\n diagnostic/experimental and have a name\n\n + [backport] 8242227: Shenandoah: transit regions to cset\n state when adding to collection set\n\n + [backport] 8242228: Shenandoah: remove unused\n ShenandoahCollectionSet methods\n\n + [backport] 8242229: Shenandoah: inline\n ShenandoahHeapRegion liveness-related methods\n\n + [backport] 8242267: Shenandoah: regions space needs to\n be aligned by os::vm_allocation_granularity()\n\n + [backport] 8242271: Shenandoah: add test to verify GC\n mode unlock\n\n + [backport] 8242273: Shenandoah: accept either SATB or IU\n barriers, but not both\n\n + [backport] 8242301: Shenandoah: Inline LRB runtime call\n\n + [backport] 8242316: Shenandoah: Turn NULL-check into\n assert in SATB slow-path entry\n\n + [backport] 8242353: Shenandoah: micro-optimize region\n liveness handling\n\n + [backport] 8242365: Shenandoah: use uint16_t instead of\n jushort for liveness cache\n\n + [backport] 8242375: Shenandoah: Remove\n ShenandoahHeuristic::record_gc_start/end methods\n\n + [backport] 8242641: Shenandoah: clear live data and\n update TAMS optimistically\n\n + [backport] 8243238: Shenandoah: explicit GC request\n should wait for a complete GC cycle\n\n + [backport] 8243301: Shenandoah: ditch\n ShenandoahAllowMixedAllocs\n\n + [backport] 8243307: Shenandoah: remove\n ShCollectionSet::live_data\n\n + [backport] 8243395: Shenandoah: demote guarantee in\n ShenandoahPhaseTimings::record_workers_end\n\n + [backport] 8243463: Shenandoah: ditch total_pause\n counters\n\n + [backport] 8243464: Shenandoah: print statistic counters\n in time order\n\n + [backport] 8243465: Shenandoah: ditch unused\n pause_other, conc_other counters\n\n + [backport] 8243487: Shenandoah: make _num_phases illegal\n phase type\n\n + [backport] 8243494: Shenandoah: set counters once per\n cycle\n\n + [backport] 8243573: Shenandoah: rename GCParPhases and\n related code\n\n + [backport] 8243848: Shenandoah: Windows build fails\n after JDK-8239786\n\n + [backport] 8244180: Shenandoah: carry Phase to\n ShWorkerTimingsTracker explicitly\n\n + [backport] 8244200: Shenandoah: build breakages after\n JDK-8241743\n\n + [backport] 8244226: Shenandoah: per-cycle statistics\n contain worker data from previous cycles\n\n + [backport] 8244326: Shenandoah: global statistics should\n not accept bogus samples\n\n + [backport] 8244509: Shenandoah: refactor\n ShenandoahBarrierC2Support::test_* methods\n\n + [backport] 8244551: Shenandoah: Fix racy update of\n update_watermark\n\n + [backport] 8244667: Shenandoah:\n SBC2Support::test_gc_state takes loop for wrong control\n\n + [backport] 8244730: Shenandoah: gc/shenandoah/options/\n /TestHeuristicsUnlock.java should only verify the\n heuristics\n\n + [backport] 8244732: Shenandoah: move heuristics code to\n gc/shenandoah/heuristics\n\n + [backport] 8244737: Shenandoah: move mode code to\n gc/shenandoah/mode\n\n + [backport] 8244739: Shenandoah: break superclass\n dependency on ShenandoahNormalMode\n\n + [backport] 8244740: Shenandoah: rename\n ShenandoahNormalMode to ShenandoahSATBMode\n\n + [backport] 8245461: Shenandoah: refine mode name()-s\n\n + [backport] 8245463: Shenandoah: refine\n ShenandoahPhaseTimings constructor arguments\n\n + [backport] 8245464: Shenandoah: allocate collection set\n bitmap at lower addresses\n\n + [backport] 8245465: Shenandoah: test_in_cset can use\n more efficient encoding\n\n + [backport] 8245726: Shenandoah: lift/cleanup\n ShenandoahHeuristics names and properties\n\n + [backport] 8245754: Shenandoah: ditch\n ShenandoahAlwaysPreTouch\n\n + [backport] 8245757: Shenandoah: AlwaysPreTouch should\n not disable heap resizing or uncommits\n\n + [backport] 8245773: Shenandoah: Windows assertion\n failure after JDK-8245464\n\n + [backport] 8245812: Shenandoah: compute root phase\n parallelism\n\n + [backport] 8245814: Shenandoah: reconsider format\n specifiers for stats\n\n + [backport] 8245825: Shenandoah: Remove diagnostic flag\n ShenandoahConcurrentScanCodeRoots\n\n + [backport] 8246162: Shenandoah: full GC does not mark\n code roots when class unloading is off\n\n + [backport] 8247310: Shenandoah: pacer should not affect\n interrupt status\n\n + [backport] 8247358: Shenandoah: reconsider free budget\n slice for marking\n\n + [backport] 8247367: Shenandoah: pacer should wait on\n lock instead of exponential backoff\n\n + [backport] 8247474: Shenandoah: Windows build warning\n after JDK-8247310\n\n + [backport] 8247560: Shenandoah: heap iteration holds\n root locks all the time\n\n + [backport] 8247593: Shenandoah: should not block pacing\n reporters\n\n + [backport] 8247751: Shenandoah: options tests should run\n with smaller heaps\n\n + [backport] 8247754: Shenandoah: mxbeans tests can be\n shorter\n\n + [backport] 8247757: Shenandoah: split heavy tests by\n heuristics to improve parallelism\n\n + [backport] 8247860: Shenandoah: add update watermark\n line in rich assert failure message\n\n + [backport] 8248041: Shenandoah: pre-Full GC root updates\n may miss some roots\n\n + [backport] 8248652: Shenandoah: SATB buffer handling may\n assume no forwarded objects\n\n + [backport] 8249560: Shenandoah: Fix racy GC request\n handling\n\n + [backport] 8249649: Shenandoah: provide per-cycle pacing\n stats\n\n + [backport] 8249801: Shenandoah: Clear soft-refs on\n requested GC cycle\n\n + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans\n tests should account for corner cases\n\n + Fix slowdebug build after JDK-8230853 backport\n\n + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for\n x86_32 and JFR\n\n + JDK-8252366: Shenandoah: revert/cleanup changes in\n graphKit.cpp\n\n + Shenandoah: add JFR roots to root processor after JFR\n integration\n\n + Shenandoah: add root statistics for string dedup\n table/queues\n\n + Shenandoah: enable low-frequency STW class unloading\n\n + Shenandoah: fix build failures after JDK-8244737\n backport\n\n + Shenandoah: Fix build failure with +JFR -PCH\n\n + Shenandoah: fix forceful pacer claim\n\n + Shenandoah: fix formats in\n ShenandoahStringSymbolTableUnlinkTask\n\n + Shenandoah: fix runtime linking failure due to\n non-compiled shenandoahBarrierSetC1\n\n + Shenandoah: hook statistics printing to PrintGCDetails,\n not PrintGC\n\n + Shenandoah: JNI weak roots are always cleared before\n Full GC mark\n\n + Shenandoah: missing SystemDictionary roots in\n ShenandoahHeapIterationRootScanner\n\n + Shenandoah: move barrier sets to their proper locations\n\n + Shenandoah: move parallelCleaning.* to shenandoah/\n\n + Shenandoah: pacer should use proper Atomics for intptr_t\n\n + Shenandoah: properly deallocates class loader metadata\n\n + Shenandoah: specialize String Table scans for better\n pause performance\n\n + Shenandoah: Zero build fails after recent Atomic cleanup\n in Pacer\n\n - AArch64 port\n\n + JDK-8161072, PR3797: AArch64: jtreg\n compiler/uncommontrap/TestDeoptOOM failure\n\n + JDK-8171537, PR3797: aarch64:\n compiler/c1/Test6849574.java generates guarantee failure\n in C1\n\n + JDK-8183925, PR3797: [AArch64] Decouple crash protection\n from watcher thread\n\n + JDK-8199712, PR3797: [AArch64] Flight Recorder\n\n + JDK-8203481, PR3797: Incorrect constraint for\n unextended_sp in frame:safe_for_sender\n\n + JDK-8203699, PR3797:\n java/lang/invoke/SpecialInterfaceCall fails with SIGILL\n on aarch64\n\n + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack\n command\n\n + JDK-8215961, PR3797:\n jdk/jfr/event/os/TestCPUInformation.java fails on\n AArch64\n\n + JDK-8216989, PR3797:\n CardTableBarrierSetAssembler::gen_write_ref_array_post_b\n arrier() does not check for zero length on AARCH64\n\n + JDK-8217368, PR3797: AArch64: C2 recursive stack locking\n optimisation not triggered\n\n + JDK-8221658, PR3797: aarch64: add necessary predicate\n for ubfx patterns\n\n + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a\n BufferBlob\n\n + JDK-8246482, PR3797: Build failures with +JFR -PCH\n\n + JDK-8247979, PR3797: aarch64: missing side effect of\n killing flags for clearArray_reg_reg\n\n + JDK-8248219, PR3797: aarch64: missing memory barrier in\n fast_storefield and fast_accessfield\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 2, "cvss3": {"score": 4.2, "vector": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}, "published": "2020-12-09T00:00:00", "title": "SUSE SLES15 Security Update : java-1_8_0-openjdk (SUSE-SU-2020:3460-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-14803", "CVE-2020-14782", "CVE-2020-14556", "CVE-2020-14792", "CVE-2020-14593", "CVE-2020-14781", "CVE-2020-14798", "CVE-2020-14779", "CVE-2020-14797", "CVE-2020-14578", "CVE-2020-14621", "CVE-2020-14583", "CVE-2020-14577", "CVE-2020-14796", "CVE-2020-14579", "CVE-2020-14581"], "modified": "2020-12-09T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-headless", "p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-debugsource", "p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-demo-debuginfo", "cpe:/o:novell:suse_linux:15", "p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-devel-debuginfo", "p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-debuginfo", "p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-demo", "p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-devel", "p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-headless-debuginfo", "p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk"], "id": "SUSE_SU-2020-3460-1.NASL", "href": "https://www.tenable.com/plugins/nessus/143794", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:3460-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(143794);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/12/11\");\n\n script_cve_id(\"CVE-2020-14556\", \"CVE-2020-14577\", \"CVE-2020-14578\", \"CVE-2020-14579\", \"CVE-2020-14581\", \"CVE-2020-14583\", \"CVE-2020-14593\", \"CVE-2020-14621\", \"CVE-2020-14779\", \"CVE-2020-14781\", \"CVE-2020-14782\", \"CVE-2020-14792\", \"CVE-2020-14796\", \"CVE-2020-14797\", \"CVE-2020-14798\", \"CVE-2020-14803\");\n\n script_name(english:\"SUSE SLES15 Security Update : java-1_8_0-openjdk (SUSE-SU-2020:3460-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for java-1_8_0-openjdk fixes the following issues :\n\nFix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)',\nintroduced in October 2020 CPU.\n\nUpdate to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,\nbsc#1174157, and October 2020 CPU, bsc#1177943)\n\n - New features\n\n + JDK-8245468: Add TLSv1.3 implementation classes from\n 11.0.7\n\n + PR3796: Allow the number of curves supported to be\n specified\n\n - Security fixes\n\n + JDK-8028431, CVE-2020-14579: NullPointerException in\n DerValue.equals(DerValue)\n\n + JDK-8028591, CVE-2020-14578: NegativeArraySizeException\n in\n sun.security.util.DerInputStream.getUnalignedBitString()\n\n + JDK-8230613: Better ASCII conversions\n\n + JDK-8231800: Better listing of arrays\n\n + JDK-8232014: Expand DTD support\n\n + JDK-8233255: Better Swing Buttons\n\n + JDK-8233624: Enhance JNI linkage\n\n + JDK-8234032: Improve basic calendar services\n\n + JDK-8234042: Better factory production of certificates\n\n + JDK-8234418: Better parsing with CertificateFactory\n\n + JDK-8234836: Improve serialization handling\n\n + JDK-8236191: Enhance OID processing\n\n + JDK-8236196: Improve string pooling\n\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy\n class\n\n + JDK-8237117, CVE-2020-14556: Better ForkJoinPool\n behavior\n\n + JDK-8237592, CVE-2020-14577: Enhance certificate\n verification\n\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n\n + JDK-8237995, CVE-2020-14782: Enhance certificate\n processing\n\n + JDK-8238002, CVE-2020-14581: Better matrix operations\n\n + JDK-8238804: Enhance key handling process\n\n + JDK-8238842: AIOOBE in\n GIFImageReader.initializeStringTable\n\n + JDK-8238843: Enhanced font handing\n\n + JDK-8238920, CVE-2020-14583: Better Buffer support\n\n + JDK-8238925: Enhance WAV file playback\n\n + JDK-8240119, CVE-2020-14593: Less Affine Transformations\n\n + JDK-8240124: Better VM Interning\n\n + JDK-8240482: Improved WAV file playback\n\n + JDK-8241114, CVE-2020-14792: Better range handling\n\n + JDK-8241379: Update JCEKS support\n\n + JDK-8241522: Manifest improved jar headers redux\n\n + JDK-8242136, CVE-2020-14621: Better XML namespace\n handling\n\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n\n + JDK-8243302: Advanced class supports\n\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n\n + JDK-8244479: Further constrain certificates\n\n + JDK-8244955: Additional Fix for JDK-8240124\n\n + JDK-8245407: Enhance zoning of times\n\n + JDK-8245412: Better class definitions\n\n + JDK-8245417: Improve certificate chain handling\n\n + JDK-8248574: Improve jpeg processing\n\n + JDK-8249927: Specify limits of\n jdk.serialProxyInterfaceLimit\n\n + JDK-8253019: Enhanced JPEG decoding\n\n - Import of OpenJDK 8 u262 build 01\n\n + JDK-4949105: Access Bridge lacks html tags parsing\n\n + JDK-8003209: JFR events for network utilization\n\n + JDK-8030680: 292 cleanup from default method code\n assessment\n\n + JDK-8035633: TEST_BUG:\n java/net/NetworkInterface/Equals.java and some tests\n failed on windows intermittently\n\n + JDK-8041626: Shutdown tracing event\n\n + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp\n\n + JDK-8149338: JVM Crash caused by Marlin renderer not\n handling NaN coordinates\n\n + JDK-8151582: (ch) test java/nio/channels/\n /AsyncCloseAndInterrupt.java failing due to 'Connection\n succeeded'\n\n + JDK-8165675: Trace event for thread park has incorrect\n unit for timeout\n\n + JDK-8176182: 4 security tests are not run\n\n + JDK-8178910: Problemlist sample tests\n\n + JDK-8183925: Decouple crash protection from watcher\n thread\n\n + JDK-8191393: Random crashes during cfree+0x1c\n\n + JDK-8195817: JFR.stop should require name of recording\n\n + JDK-8195818: JFR.start should increase autogenerated\n name by one\n\n + JDK-8195819: Remove recording=x from jcmd JFR.check\n output\n\n + JDK-8199712: Flight Recorder\n\n + JDK-8202578: Revisit location for class unload events\n\n + JDK-8202835: jfr/event/os/TestSystemProcess.java fails\n on missing events\n\n + JDK-8203287: Zero fails to build after JDK-8199712\n (Flight Recorder)\n\n + JDK-8203346: JFR: Inconsistent signature of\n jfr_add_string_constant\n\n + JDK-8203664: JFR start failure after AppCDS archive\n created with JFR StartFlightRecording\n\n + JDK-8203921: JFR thread sampling is missing fixes from\n JDK-8194552\n\n + JDK-8203929: Limit amount of data for JFR.dump\n\n + JDK-8205516: JFR tool\n\n + JDK-8207392: [PPC64] Implement JFR profiling\n\n + JDK-8207829: FlightRecorderMXBeanImpl is leaking the\n first classloader which calls it\n\n + JDK-8209960: -Xlog:jfr* doesn't work with the JFR\n\n + JDK-8210024: JFR calls virtual is_Java_thread from\n ~Thread()\n\n + JDK-8210776: Upgrade X Window System 6.8.2 to the latest\n XWD 1.0.7\n\n + JDK-8211239: Build fails without JFR: empty JFR events\n signatures mismatch\n\n + JDK-8212232: Wrong metadata for the configuration of the\n cutoff for old object sample events\n\n + JDK-8213015: Inconsistent settings between JFR.configure\n and\n\n -XX:FlightRecorderOptions\n\n + JDK-8213421: Line number information for execution\n samples always 0\n\n + JDK-8213617: JFR should record the PID of the recorded\n process\n\n + JDK-8213734: SAXParser.parse(File, ..) does not close\n resources when Exception occurs.\n\n + JDK-8213914: [TESTBUG] Several JFR VM events are not\n covered by tests\n\n + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered\n by test\n\n + JDK-8213966: The ZGC JFR events should be marked as\n experimental\n\n + JDK-8214542: JFR: Old Object Sample event slow on a deep\n heap in debug builds\n\n + JDK-8214750: Unnecessary tags in jfr classes\n\n + JDK-8214896: JFR Tool left files behind\n\n + JDK-8214906: [TESTBUG]\n jfr/event/sampling/TestNative.java fails with\n UnsatisfiedLinkError\n\n + JDK-8214925: JFR tool fails to execute\n\n + JDK-8215175: Inconsistencies in JFR event metadata\n\n + JDK-8215237: jdk.jfr.Recording javadoc does not compile\n\n + JDK-8215284: Reduce noise induced by periodic task\n getFileSize()\n\n + JDK-8215355: Object monitor deadlock with no threads\n holding the monitor (using jemalloc 5.1)\n\n + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails\n\n + JDK-8215771: The jfr tool should pretty print reference\n chains\n\n + JDK-8216064: -XX:StartFlightRecording:settings= doesn't\n work properly\n\n + JDK-8216486: Possibility of integer overflow in\n JfrThreadSampler::run()\n\n + JDK-8216528: test/jdk/java/rmi/transport/\n /runtimeThreadInheritanceLeak/\n /RuntimeThreadInheritanceLeak.java failing with Xcomp\n\n + JDK-8216559: [JFR] Native libraries not correctly parsed\n from /proc/self/maps\n\n + JDK-8216578: Remove unused/obsolete method in JFR code\n\n + JDK-8216995: Clean up JFR command line processing\n\n + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on\n some systems due to process surviving SIGINT\n\n + JDK-8217748: [TESTBUG] Exclude TestSig test case from\n JFR TestShutdownEvent\n\n + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly\n\n + JDK-8223147: JFR Backport\n\n + JDK-8223689: Add JFR Thread Sampling Support\n\n + JDK-8223690: Add JFR BiasedLock Event Support\n\n + JDK-8223691: Add JFR G1 Region Type Change Event Support\n\n + JDK-8223692: Add JFR G1 Heap Summary Event Support\n\n + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:\n invariant\n\n + JDK-8224475: JTextPane does not show images in HTML\n rendering\n\n + JDK-8226253: JAWS reports wrong number of radio buttons\n when buttons are hidden.\n\n + JDK-8226779: [TESTBUG] Test JFR API from Java agent\n\n + JDK-8226892: ActionListeners on JRadioButtons don't get\n notified when selection is changed with arrow keys\n\n + JDK-8227011: Starting a JFR recording in response to\n JVMTI VMInit and / or Java agent premain corrupts memory\n\n + JDK-8227605: Kitchensink fails\n 'assert((((klass)->trace_id() &\n (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))\n failed: invariant'\n\n + JDK-8229366: JFR backport allows unchecked writing to\n memory\n\n + JDK-8229401: Fix JFR code cache test failures\n\n + JDK-8229708: JFR backport code does not initialize\n\n + JDK-8229873: 8229401 broke jdk8u-jfr-incubator\n\n + JDK-8230448: [test] JFRSecurityTestSuite.java is failing\n on Windows\n\n + JDK-8230707: JFR related tests are failing\n\n + JDK-8230782: Robot.createScreenCapture() fails if\n 'awt.robot.gtk' is set to false\n\n + JDK-8230856: Java_java_net_NetworkInterface_getByName0\n on unix misses ReleaseStringUTFChars in early return\n\n + JDK-8230947: TestLookForUntestedEvents.java is failing\n after JDK-8230707\n\n + JDK-8231995: two jtreg tests failed after 8229366 is\n fixed\n\n + JDK-8233623: Add classpath exception to copyright in\n EventHandlerProxyCreator.java file\n\n + JDK-8236002: CSR for JFR backport suggests not leaving\n out the package-info\n\n + JDK-8236008: Some backup files were accidentally left in\n the hotspot tree\n\n + JDK-8236074: Missed package-info\n\n + JDK-8236174: Should update javadoc since tags\n\n + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR\n Backport\n\n + JDK-8238452: Keytool generates wrong expiration date if\n validity is set to 2050/01/01\n\n + JDK-8238555: Allow Initialization of SunPKCS11 with NSS\n when there are external FIPS modules in the NSSDB\n\n + JDK-8238589: Necessary code cleanup in JFR for JDK8u\n\n + JDK-8238590: Enable JFR by default during compilation in\n 8u\n\n + JDK-8239055: Wrong implementation of VMState.hasListener\n\n + JDK-8239476: JDK-8238589 broke windows build by moving\n OrderedPair\n\n + JDK-8239479: minimal1 and zero builds are failing\n\n + JDK-8239867: correct over use of INCLUDE_JFR macro\n\n + JDK-8240375: Disable JFR by default for July 2020\n release\n\n + JDK-8241444: Metaspace::_class_vsm not initialized if\n compressed class pointers are disabled\n\n + JDK-8241902: AIX Build broken after integration of\n JDK-8223147 (JFR Backport)\n\n + JDK-8242788: Non-PCH build is broken after JDK-8191393\n\n - Import of OpenJDK 8 u262 build 02\n\n + JDK-8130737: AffineTransformOp can't handle child raster\n with non-zero x-offset\n\n + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st\n annotation in\n java/awt/image/Raster/TestChildRasterOp.java\n\n + JDK-8230926: [macosx] Two apostrophes are entered\n instead of one with 'U.S. International - PC' layout\n\n + JDK-8240576: JVM crashes after transformation in C2\n IdealLoopTree::merge_many_backedges\n\n + JDK-8242883: Incomplete backport of JDK-8078268:\n backport test part\n\n - Import of OpenJDK 8 u262 build 03\n\n + JDK-8037866: Replace the Fun class in tests with lambdas\n\n + JDK-8146612: C2: Precedence edges specification violated\n\n + JDK-8150986: serviceability/sa/jmap-hprof/\n /JMapHProfLargeHeapTest.java failing because expects\n HPROF JAVA PROFILE 1.0.1 file format\n\n + JDK-8229888: (zipfs) Updating an existing zip file does\n not preserve original permissions\n\n + JDK-8230597: Update GIFlib library to the 5.2.1\n\n + JDK-8230769: BufImg_SetupICM add\n ReleasePrimitiveArrayCritical call in early return\n\n + JDK-8233880, PR3798: Support compilers with multi-digit\n major version numbers\n\n + JDK-8239852: java/util/concurrent tests fail with\n\n -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) \nfailed :\n\nverification should have failed\n\n + JDK-8241638: launcher time metrics always report 1 on\n Linux when _JAVA_LAUNCHER_DEBUG set\n\n + JDK-8243059: Build fails when --with-vendor-name\n contains a comma\n\n + JDK-8243474: [TESTBUG] removed three tests of 0 bytes\n\n + JDK-8244461: [JDK 8u] Build fails with glibc 2.32\n\n + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()\n returns wrong result\n\n - Import of OpenJDK 8 u262 build 04\n\n + JDK-8067796: (process) Process.waitFor(timeout, unit)\n doesn't throw NPE if timeout is less than, or equal to\n zero when unit == null\n\n + JDK-8148886: SEGV in\n sun.java2d.marlin.Renderer._endRendering\n\n + JDK-8171934:\n ObjectSizeCalculator.getEffectiveMemoryLayoutSpecificati\n on() does not recognize OpenJDK's HotSpot VM\n\n + JDK-8196969: JTreg Failure:\n serviceability/sa/ClhsdbJstack.java causes NPE\n\n + JDK-8243539: Copyright info (Year) should be updated for\n fix of 8241638\n\n + JDK-8244777: ClassLoaderStats VM Op uses constant hash\n value\n\n - Import of OpenJDK 8 u262 build 05\n\n + JDK-7147060: com/sun/org/apache/xml/internal/security/\n /transforms/ClassLoaderTest.java doesn't run in agentvm\n mode\n\n + JDK-8178374: Problematic ByteBuffer handling in\n CipherSpi.bufferCrypt method\n\n + JDK-8181841: A TSA server returns timestamp with\n precision higher than milliseconds\n\n + JDK-8227269: Slow class loading when running with JDWP\n\n + JDK-8229899: Make java.io.File.isInvalid() less racy\n\n + JDK-8236996: Incorrect Roboto font rendering on Windows\n with subpixel antialiasing\n\n + JDK-8241750: x86_32 build failure after JDK-8227269\n\n + JDK-8244407: JVM crashes after transformation in C2\n IdealLoopTree::split_fall_in\n\n + JDK-8244843: JapanEraNameCompatTest fails\n\n - Import of OpenJDK 8 u262 build 06\n\n + JDK-8246223: Windows build fails after JDK-8227269\n\n - Import of OpenJDK 8 u262 build 07\n\n + JDK-8233197: Invert JvmtiExport::post_vm_initialized()\n and Jfr:on_vm_start() start-up order for correct option\n parsing\n\n + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a\n\n + JDK-8245167: Top package in method profiling shows null\n in JMC\n\n + JDK-8246703: [TESTBUG] Add test for JDK-8233197\n\n - Import of OpenJDK 8 u262 build 08\n\n + JDK-8220293: Deadlock in JFR string pool\n\n + JDK-8225068: Remove DocuSign root certificate that is\n expiring in May 2020\n\n + JDK-8225069: Remove Comodo root certificate that is\n expiring in May 2020\n\n - Import of OpenJDK 8 u262 build 09\n\n + JDK-8248399: Build installs jfr binary when JFR is\n disabled\n\n - Import of OpenJDK 8 u262 build 10\n\n + JDK-8248715: New JavaTimeSupplementary localisation for\n 'in' installed in wrong package\n\n - Import of OpenJDK 8 u265 build 01\n\n + JDK-8249677: Regression in 8u after JDK-8237117: Better\n ForkJoinPool behavior\n\n + JDK-8250546: Expect changed behaviour reported in\n JDK-8249846\n\n - Import of OpenJDK 8 u272 build 01\n\n + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY\n test/compiler/7177917/Test7177917.java\n\n + JDK-8035493: JVMTI PopFrame capability must instruct\n compilers not to prune locals\n\n + JDK-8036088: Replace strtok() with its safe equivalent\n strtok_s() in DefaultProxySelector.c\n\n + JDK-8039082: [TEST_BUG] Test java/awt/dnd/\n /BadSerializationTest/BadSerializationTest.java fails\n\n + JDK-8075774: Small readability and performance\n improvements for zipfs\n\n + JDK-8132206: move ScanTest.java into OpenJDK\n\n + JDK-8132376: Add @requires os.family to the client tests\n with access to internal OS-specific API\n\n + JDK-8132745: minor cleanup of\n java/util/Scanner/ScanTest.java\n\n + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/\n /appletviewer/IOExceptionIfEncodedURLTest/\n /IOExceptionIfEncodedURLTest.sh\n\n + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/\n /MTGraphicsAccessTest.java hangs on Win. 8\n\n + JDK-8151788: NullPointerException from ntlm.Client.type3\n\n + JDK-8151834: Test SmallPrimeExponentP.java times out\n intermittently\n\n + JDK-8153430: jdk regression test MletParserLocaleTest,\n ParserInfiniteLoopTest reduce default timeout\n\n + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary\n public\n\n + JDK-8156169: Some sound tests rarely hangs because of\n incorrect synchronization\n\n + JDK-8165936: Potential Heap buffer overflow when\n seaching timezone info files\n\n + JDK-8166148: Fix for JDK-8165936 broke solaris builds\n\n + JDK-8167300: Scheduling failures during gcm should be\n fatal\n\n + JDK-8167615: Opensource unit/regression tests for\n JavaSound\n\n + JDK-8172012: [TEST_BUG] delays needed in\n javax/swing/JTree/4633594/bug4633594.java\n\n + JDK-8177628: Opensource unit/regression tests for\n ImageIO\n\n + JDK-8183341: Better cleanup for\n javax/imageio/AllowSearch.java\n\n + JDK-8183351: Better cleanup for\n jdk/test/javax/imageio/spi/\n /AppletContextTest/BadPluginConfigurationTest.sh\n\n + JDK-8193137: Nashorn crashes when given an empty script\n file\n\n + JDK-8194298: Add support for per Socket configuration of\n TCP keepalive\n\n + JDK-8198004:\n javax/swing/JFileChooser/6868611/bug6868611.java throws\n error\n\n + JDK-8200313:\n java/awt/Gtk/GtkVersionTest/GtkVersionTest.java fails\n\n + JDK-8210147: adjust some WSAGetLastError usages in\n windows network coding\n\n + JDK-8211714: Need to update vm_version.cpp to recognise\n VS2017 minor versions\n\n + JDK-8214862: assert(proj != __null) at compile.cpp:3251\n\n + JDK-8217606: LdapContext#reconnect always opens a new\n connection\n\n + JDK-8217647: JFR: recordings on 32-bit systems\n unreadable\n\n + JDK-8226697: Several tests which need the @key headful\n keyword are missing it.\n\n + JDK-8229378: jdwp library loader in linker_md.c quietly\n truncates on buffer overflow\n\n + JDK-8230303: JDB hangs when running monitor command\n\n + JDK-8230711: ConnectionGraph::unique_java_object(Node*\n N) return NULL if n is not in the CG\n\n + JDK-8234617: C1: Incorrect result of field load due to\n missing narrowing conversion\n\n + JDK-8235243: handle VS2017 15.9 and VS2019 in\n abstract_vm_version\n\n + JDK-8235325: build failure on Linux after 8235243\n\n + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a\n symlink\n\n + JDK-8237951: CTW: C2 compilation fails with 'malformed\n control flow'\n\n + JDK-8238225: Issues reported after replacing symlink at\n Contents/MacOS/libjli.dylib with binary\n\n + JDK-8239385: KerberosTicket client name refers wrongly\n to sAMAccountName in AD\n\n + JDK-8239819: XToolkit: Misread of screen information\n memory\n\n + JDK-8240295: hs_err elapsed time in seconds is not\n accurate enough\n\n + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system\n property with a security one\n\n + JDK-8242498: Invalid 'sun.awt.TimedWindowEvent' object\n leads to JVM crash\n\n + JDK-8243489: Thread CPU Load event may contain wrong\n data for CPU time under certain conditions\n\n + JDK-8244818: Java2D Queue Flusher crash while moving\n application window to external monitor\n\n + JDK-8246310: Clean commented-out code about ModuleEntry\n and PackageEntry in JFR\n\n + JDK-8246384: Enable JFR by default on supported\n architectures for October 2020 release\n\n + JDK-8248643: Remove extra leading space in JDK-8240295\n 8u backport\n\n + JDK-8249610: Make\n sun.security.krb5.Config.getBooleanObject(String...\n keys) method public\n\n - Import of OpenJDK 8 u272 build 02\n\n + JDK-8023697: failed class resolution reports different\n class name in detail message for the first and\n subsequent times\n\n + JDK-8025886: replace [[ and == bash extensions in\n regtest\n\n + JDK-8046274: Removing dependency on jakarta-regexp\n\n + JDK-8048933: -XX:+TraceExceptions output should include\n the message\n\n + JDK-8076151: [TESTBUG] Test\n java/awt/FontClass/CreateFont/ /fileaccess/FontFile.java\n fails\n\n + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'\n treated by JVM as an equivalent\n\n + JDK-8154313: Generated javadoc scattered all over the\n place\n\n + JDK-8163251: Hard-coded loop limit prevents reading of\n smart card data greater than 8k\n\n + JDK-8173300:\n [TESTBUG]compiler/tiered/NonTieredLevelsTest.java fails\n with compiler.whitebox.SimpleTestCaseHelper(int) must be\n compiled\n\n + JDK-8183349: Better cleanup for jdk/test/javax/imageio/\n /plugins/shared/CanWriteSequence.java and\n WriteAfterAbort.java\n\n + JDK-8191678: [TESTBUG] Add keyword headful in java/awt\n FocusTransitionTest test.\n\n + JDK-8201633: Problems with AES-GCM native acceleration\n\n + JDK-8211049: Second parameter of 'initialize' method is\n not used\n\n + JDK-8219566: JFR did not collect call stacks when\n MaxJavaStackTraceDepth is set to zero\n\n + JDK-8220165: Encryption using GCM results in\n RuntimeException- input length out of bound\n\n + JDK-8220555: JFR tool shows potentially misleading\n message when it cannot access a file\n\n + JDK-8224217: RecordingInfo should use textual\n representation of path\n\n + JDK-8231779: crash\n HeapWord*ParallelScavengeHeap::failed_mem_allocate\n\n + JDK-8238380, PR3798:\n java.base/unix/native/libjava/childproc.c 'multiple\n definition' link errors with GCC10\n\n + JDK-8238386, PR3798: (sctp)\n jdk.sctp/unix/native/libsctp/ /SctpNet.c 'multiple\n definition' link errors with GCC10\n\n + JDK-8238388, PR3798: libj2gss/NativeFunc.o 'multiple\n definition' link errors with GCC10\n\n + JDK-8242556: Cannot load RSASSA-PSS public key with\n non-null params from byte array\n\n + JDK-8250755: Better cleanup for jdk/test/javax/imageio/\n /plugins/shared/CanWriteSequence.java\n\n - Import of OpenJDK 8 u272 build 03\n\n + JDK-6574989: TEST_BUG:\n javax/sound/sampled/Clip/bug5070081.java fails sometimes\n\n + JDK-8148754: C2 loop unrolling fails due to unexpected\n graph shape\n\n + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh\n tests fail with error : revokeall.exe: Permission denied\n\n + JDK-8203357: Container Metrics\n\n + JDK-8209113: Use WeakReference for lastFontStrike for\n created Fonts\n\n + JDK-8216283: Allow shorter method sampling interval than\n 10 ms\n\n + JDK-8221569: JFR tool produces incorrect output when\n both\n\n --categories and --events are specified\n\n + JDK-8233097: Fontmetrics for large Fonts has zero width\n\n + JDK-8248851: CMS: Missing memory fences between free\n chunk check and klass read\n\n + JDK-8250875: Incorrect parameter type for update_number\n in JDK_Version::jdk_update\n\n - Import of OpenJDK 8 u272 build 04\n\n + JDK-8061616: HotspotDiagnosticMXBean.getVMOption()\n throws IllegalArgumentException for flags of type double\n\n + JDK-8177334: Update xmldsig implementation to Apache\n Santuario 2.1.1\n\n + JDK-8217878: ENVELOPING XML signature no longer works in\n JDK 11\n\n + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR\n exception on OpenJDK 11, works 8/9/10\n\n + JDK-8243138: Enhance BaseLdapServer to support starttls\n extended request\n\n - Import of OpenJDK 8 u272 build 05\n\n + JDK-8026236: Add PrimeTest for BigInteger\n\n + JDK-8057003: Large reference arrays cause extremely long\n synchronization times\n\n + JDK-8060721: Test runtime/SharedArchiveFile/\n /LimitSharedSizes.java fails in jdk 9 fcs new\n platforms/compiler\n\n + JDK-8152077: (cal) Calendar.roll does not always roll\n the hours during daylight savings\n\n + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed\n\n + JDK-8211163: UNIX version of Java_java_io_Console_echo\n does not return a clean boolean\n\n + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount\n test in docker container only works with debug JVMs\n\n + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK\n Repo\n\n + JDK-8236645: JDK 8u231 introduces a regression with\n incompatible handling of XML messages\n\n + JDK-8240676: Meet not symmetric failure when running\n lucene on jdk8\n\n + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA\n program\n\n + JDK-8249158: THREAD_START and THREAD_END event posted in\n primordial phase\n\n + JDK-8250627: Use -XX:+/-UseContainerSupport for\n enabling/disabling Java container metrics\n\n + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and\n Solaris builds\n\n + JDK-8252084: Minimal VM fails to bootcycle: undefined\n symbol:\n AgeTableTracer::is_tenuring_distribution_event_enabled\n\n - Import of OpenJDK 8 u272 build 06\n\n + JDK-8064319: Need to enable -XX:+TraceExceptions in\n release builds\n\n + JDK-8080462, PR3801: Update SunPKCS11 provider with\n PKCS11 v2.40 support\n\n + JDK-8160768: Add capability to custom resolve\n host/domain names within the default JNDI LDAP provider\n\n + JDK-8161973:\n PKIXRevocationChecker.getSoftFailExceptions() not\n working\n\n + JDK-8169925, PR3801: PKCS #11 Cryptographic Token\n Interface license\n\n + JDK-8184762: ZapStackSegments should use optimized\n memset\n\n + JDK-8193234: When using -Xcheck:jni an internally\n allocated buffer can leak\n\n + JDK-8219919: RuntimeStub name lost with\n PrintFrameConverterAssembly\n\n + JDK-8220313: [TESTBUG] Update base image for Docker\n testing to OL 7.6\n\n + JDK-8222079: Don't use memset to initialize fields\n decode_env constructor in disassembler.cpp\n\n + JDK-8225695: 32-bit build failures after JDK-8080462\n (Update SunPKCS11 provider with PKCS11 v2.40 support)\n\n + JDK-8226575: OperatingSystemMXBean should be made\n container aware\n\n + JDK-8226809: Circular reference in printed stack trace\n is not correctly indented & ambiguous\n\n + JDK-8228835: Memory leak in PKCS11 provider when using\n AES GCM\n\n + JDK-8233621: Mismatch in jsse.enableMFLNExtension\n property name\n\n + JDK-8238898, PR3801: Missing hash characters for header\n on license file\n\n + JDK-8243320: Add SSL root certificates to Oracle Root CA\n program\n\n + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the\n latest release 1.8.26\n\n + JDK-8245467: Remove 8u TLSv1.2 implementation files\n\n + JDK-8245469: Remove DTLS protocol implementation\n\n + JDK-8245470: Fix JDK8 compatibility issues\n\n + JDK-8245471: Revert JDK-8148188\n\n + JDK-8245472: Backport JDK-8038893 to JDK8\n\n + JDK-8245473: OCSP stapling support\n\n + JDK-8245474: Add TLS_KRB5 cipher suites support\n according to RFC-2712\n\n + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello\n message by default\n\n + JDK-8245477: Adjust TLS tests location\n\n + JDK-8245653: Remove 8u TLS tests\n\n + JDK-8245681: Add TLSv1.3 regression test from 11.0.7\n\n + JDK-8251117: Cannot check P11Key size in P11Cipher and\n P11AEADCipher\n\n + JDK-8251120, PR3793: [8u] HotSpot build assumes\n ENABLE_JFR is set to either true or false\n\n + JDK-8251341: Minimal Java specification change\n\n + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u\n\n - Import of OpenJDK 8 u272 build 07\n\n + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ\n\n - Import of OpenJDK 8 u272 build 08\n\n + JDK-8062947: Fix exception message to correctly\n represent LDAP connection failure\n\n + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java\n failed due to timeout on DeadServerNoTimeoutTest is\n incorrect\n\n + JDK-8252573: 8u: Windows build failed after 8222079\n backport\n\n - Import of OpenJDK 8 u272 build 09\n\n + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :\n Compilation failed\n\n - Import of OpenJDK 8 u272 build 10\n\n + JDK-8254673: Call to JvmtiExport::post_vm_start() was\n removed by the fix for JDK-8249158\n\n + JDK-8254937: Revert JDK-8148854 for 8u272\n\n - Backports\n\n + JDK-8038723, PR3806: Openup some PrinterJob tests\n\n + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when\n JTable contains certain string\n\n + JDK-8058779, PR3805: Faster implementation of\n String.replace(CharSequence, CharSequence)\n\n + JDK-8130125, PR3806: [TEST_BUG] add @modules to the\n several client tests unaffected by the automated bulk\n update\n\n + JDK-8144015, PR3806: [PIT] failures of text layout font\n tests\n\n + JDK-8144023, PR3806: [PIT] failure of text measurements\n in\n javax/swing/text/html/parser/Parser/6836089/bug6836089.j\n ava\n\n + JDK-8144240, PR3806: [macosx][PIT] AIOOB in\n closed/javax/swing/text/GlyphPainter2/6427244/bug6427244\n .java\n\n + JDK-8145542, PR3806: The case failed automatically and\n thrown java.lang.ArrayIndexOutOfBoundsException\n exception\n\n + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception\n when displaying Devanagari text in JEditorPane\n\n + JDK-8152358, PR3800: code and comment cleanups found\n during the hunt for 8077392\n\n + JDK-8152545, PR3804: Use preprocessor instead of\n compiling a program to generate native nio constants\n\n + JDK-8152680, PR3806: Regression in\n GlyphVector.getGlyphCharIndex behaviour\n\n + JDK-8158924, PR3806: Incorrect i18n text document layout\n\n + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for\n javax/swing/text/GlyphPainter2/6427244/bug6427244.java\n\n + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/\n /GetGlyphCharIndexTest.java does not compile\n\n + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/\n /GlyphPainter2/6427244/bug6427244.java - compilation\n failed\n\n + JDK-8191512, PR3806: T2K font rasterizer code removal\n\n + JDK-8191522, PR3806: Remove Bigelow&Holmes Lucida fonts\n from JDK sources\n\n + JDK-8236512, PR3801: PKCS11 Connection closed after\n Cipher.doFinal and NoPadding\n\n + JDK-8254177, PR3809: (tz) Upgrade time-zone data to\n tzdata2020b\n\n - Bug fixes\n\n + PR3798: Fix format-overflow error on GCC 10, caused by\n passing NULL to a '%s' directive\n\n + PR3795: ECDSAUtils for XML digital signatures should\n support the same curve set as the rest of the JDK\n\n + PR3799: Adapt elliptic curve patches to JDK-8245468: Add\n TLSv1.3 implementation classes from 11.0.7\n\n + PR3808: IcedTea does not install the JFR *.jfc files\n\n + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096\n has fixed its use with Shenandoah\n\n + PR3811: Don't attempt to install JFR files when JFR is\n disabled\n\n - Shenandoah\n\n + [backport] 8221435: Shenandoah should not mark through\n weak roots\n\n + [backport] 8221629: Shenandoah: Cleanup class unloading\n logic\n\n + [backport] 8222992: Shenandoah: Pre-evacuate all roots\n\n + [backport] 8223215: Shenandoah: Support verifying subset\n of roots\n\n + [backport] 8223774: Shenandoah: Refactor\n ShenandoahRootProcessor and family\n\n + [backport] 8224210: Shenandoah: Refactor\n ShenandoahRootScanner to support scanning CSet codecache\n roots\n\n + [backport] 8224508: Shenandoah: Need to update thread\n roots in final mark for piggyback ref update cycle\n\n + [backport] 8224579: ResourceMark not declared in\n shenandoahRootProcessor.inline.hpp with\n\n --disable-precompiled-headers\n\n + [backport] 8224679: Shenandoah: Make\n ShenandoahParallelCodeCacheIterator noncopyable\n\n + [backport] 8224751: Shenandoah: Shenandoah Verifier\n should select proper roots according to current GC cycle\n\n + [backport] 8225014: Separate ShenandoahRootScanner\n method for object_iterate\n\n + [backport] 8225216: gc/logging/TestMetaSpaceLog.java\n doesn't work for Shenandoah\n\n + [backport] 8225573: Shenandoah: Enhance\n ShenandoahVerifier to ensure roots to-space invariant\n\n + [backport] 8225590: Shenandoah: Refactor\n ShenandoahClassLoaderDataRoots API\n\n + [backport] 8226413: Shenandoah: Separate root scanner\n for SH::object_iterate()\n\n + [backport] 8230853: Shenandoah: replace leftover\n assert(is_in(...)) with rich asserts\n\n + [backport] 8231198: Shenandoah: heap walking should\n visit all roots most of the time\n\n + [backport] 8231244: Shenandoah: all-roots heap walking\n misses some weak roots\n\n + [backport] 8237632: Shenandoah: accept NULL fwdptr to\n cooperate with JVMTI and JFR\n\n + [backport] 8239786: Shenandoah: print per-cycle\n statistics\n\n + [backport] 8239926: Shenandoah: Shenandoah needs to mark\n nmethod's metadata\n\n + [backport] 8240671: Shenandoah: refactor\n ShenandoahPhaseTimings\n\n + [backport] 8240749: Shenandoah: refactor ShenandoahUtils\n\n + [backport] 8240750: Shenandoah: remove leftover files\n and mentions of ShenandoahAllocTracker\n\n + [backport] 8240868: Shenandoah: remove CM-with-UR\n piggybacking cycles\n\n + [backport] 8240872: Shenandoah: Avoid updating new\n regions from start of evacuation\n\n + [backport] 8240873: Shenandoah: Short-cut arraycopy\n barriers\n\n + [backport] 8240915: Shenandoah: Remove unused fields in\n init mark tasks\n\n + [backport] 8240948: Shenandoah: cleanup\n not-forwarded-objects paths after JDK-8240868\n\n + [backport] 8241007: Shenandoah: remove\n ShenandoahCriticalControlThreadPriority support\n\n + [backport] 8241062: Shenandoah: rich asserts trigger\n 'empty statement' inspection\n\n + [backport] 8241081: Shenandoah: Do not modify\n update-watermark concurrently\n\n + [backport] 8241093: Shenandoah: editorial changes in\n flag descriptions\n\n + [backport] 8241139: Shenandoah: distribute mark-compact\n work exactly to minimize fragmentation\n\n + [backport] 8241142: Shenandoah: should not use parallel\n reference processing with single GC thread\n\n + [backport] 8241351: Shenandoah: fragmentation metrics\n overhaul\n\n + [backport] 8241435: Shenandoah: avoid disabling pacing\n with 'aggressive'\n\n + [backport] 8241520: Shenandoah: simplify region sequence\n numbers handling\n\n + [backport] 8241534: Shenandoah: region status should\n include update watermark\n\n + [backport] 8241574: Shenandoah: remove\n ShenandoahAssertToSpaceClosure\n\n + [backport] 8241583: Shenandoah: turn heap lock asserts\n into macros\n\n + [backport] 8241668: Shenandoah: make\n ShenandoahHeapRegion not derive from ContiguousSpace\n\n + [backport] 8241673: Shenandoah: refactor\n anti-false-sharing padding\n\n + [backport] 8241675: Shenandoah: assert(n->outcnt() > 0)\n at shenandoahSupport.cpp:2858 with\n java/util/Collections/FindSubList.java\n\n + [backport] 8241692: Shenandoah: remove\n ShenandoahHeapRegion::_reserved\n\n + [backport] 8241700: Shenandoah: Fold\n ShenandoahKeepAliveBarrier flag into\n ShenandoahSATBBarrier\n\n + [backport] 8241740: Shenandoah: remove\n ShenandoahHeapRegion::_heap\n\n + [backport] 8241743: Shenandoah: refactor and inline\n ShenandoahHeap::heap()\n\n + [backport] 8241748: Shenandoah: inline MarkingContext\n TAMS methods\n\n + [backport] 8241838: Shenandoah: no need to trash cset\n during final mark\n\n + [backport] 8241841: Shenandoah: ditch one of allocation\n type counters in ShenandoahHeapRegion\n\n + [backport] 8241842: Shenandoah: inline\n ShenandoahHeapRegion::region_number\n\n + [backport] 8241844: Shenandoah: rename\n ShenandoahHeapRegion::region_number\n\n + [backport] 8241845: Shenandoah: align\n ShenandoahHeapRegions to cache lines\n\n + [backport] 8241926: Shenandoah: only print heap changes\n for operations that directly affect it\n\n + [backport] 8241983: Shenandoah: simplify FreeSet logging\n\n + [backport] 8241985: Shenandoah: simplify collectable\n garbage logging\n\n + [backport] 8242040: Shenandoah: print allocation failure\n type\n\n + [backport] 8242041: Shenandoah: adaptive heuristics\n should account evac reserve in free target\n\n + [backport] 8242042: Shenandoah: tune down\n ShenandoahGarbageThreshold\n\n + [backport] 8242054: Shenandoah: New incremental-update\n mode\n\n + [backport] 8242075: Shenandoah: rename\n ShenandoahHeapRegionSize flag\n\n + [backport] 8242082: Shenandoah: Purge Traversal mode\n\n + [backport] 8242083: Shenandoah: split 'Prepare\n Evacuation' tracking into cset/freeset counters\n\n + [backport] 8242089: Shenandoah: per-worker stats should\n be summed up, not averaged\n\n + [backport] 8242101: Shenandoah: coalesce and parallelise\n heap region walks during the pauses\n\n + [backport] 8242114: Shenandoah: remove\n ShenandoahHeapRegion::reset_alloc_metadata_to_shared\n\n + [backport] 8242130: Shenandoah: Simplify\n arraycopy-barrier dispatching\n\n + [backport] 8242211: Shenandoah: remove\n ShenandoahHeuristics::RegionData::_seqnum_last_alloc\n\n + [backport] 8242212: Shenandoah: initialize\n ShenandoahHeuristics::_region_data eagerly\n\n + [backport] 8242213: Shenandoah: remove\n ShenandoahHeuristics::_bytes_in_cset\n\n + [backport] 8242217: Shenandoah: Enable GC mode to be\n diagnostic/experimental and have a name\n\n + [backport] 8242227: Shenandoah: transit regions to cset\n state when adding to collection set\n\n + [backport] 8242228: Shenandoah: remove unused\n ShenandoahCollectionSet methods\n\n + [backport] 8242229: Shenandoah: inline\n ShenandoahHeapRegion liveness-related methods\n\n + [backport] 8242267: Shenandoah: regions space needs to\n be aligned by os::vm_allocation_granularity()\n\n + [backport] 8242271: Shenandoah: add test to verify GC\n mode unlock\n\n + [backport] 8242273: Shenandoah: accept either SATB or IU\n barriers, but not both\n\n + [backport] 8242301: Shenandoah: Inline LRB runtime call\n\n + [backport] 8242316: Shenandoah: Turn NULL-check into\n assert in SATB slow-path entry\n\n + [backport] 8242353: Shenandoah: micro-optimize region\n liveness handling\n\n + [backport] 8242365: Shenandoah: use uint16_t instead of\n jushort for liveness cache\n\n + [backport] 8242375: Shenandoah: Remove\n ShenandoahHeuristic::record_gc_start/end methods\n\n + [backport] 8242641: Shenandoah: clear live data and\n update TAMS optimistically\n\n + [backport] 8243238: Shenandoah: explicit GC request\n should wait for a complete GC cycle\n\n + [backport] 8243301: Shenandoah: ditch\n ShenandoahAllowMixedAllocs\n\n + [backport] 8243307: Shenandoah: remove\n ShCollectionSet::live_data\n\n + [backport] 8243395: Shenandoah: demote guarantee in\n ShenandoahPhaseTimings::record_workers_end\n\n + [backport] 8243463: Shenandoah: ditch total_pause\n counters\n\n + [backport] 8243464: Shenandoah: print statistic counters\n in time order\n\n + [backport] 8243465: Shenandoah: ditch unused\n pause_other, conc_other counters\n\n + [backport] 8243487: Shenandoah: make _num_phases illegal\n phase type\n\n + [backport] 8243494: Shenandoah: set counters once per\n cycle\n\n + [backport] 8243573: Shenandoah: rename GCParPhases and\n related code\n\n + [backport] 8243848: Shenandoah: Windows build fails\n after JDK-8239786\n\n + [backport] 8244180: Shenandoah: carry Phase to\n ShWorkerTimingsTracker explicitly\n\n + [backport] 8244200: Shenandoah: build breakages after\n JDK-8241743\n\n + [backport] 8244226: Shenandoah: per-cycle statistics\n contain worker data from previous cycles\n\n + [backport] 8244326: Shenandoah: global statistics should\n not accept bogus samples\n\n + [backport] 8244509: Shenandoah: refactor\n ShenandoahBarrierC2Support::test_* methods\n\n + [backport] 8244551: Shenandoah: Fix racy update of\n update_watermark\n\n + [backport] 8244667: Shenandoah:\n SBC2Support::test_gc_state takes loop for wrong control\n\n + [backport] 8244730: Shenandoah: gc/shenandoah/options/\n /TestHeuristicsUnlock.java should only verify the\n heuristics\n\n + [backport] 8244732: Shenandoah: move heuristics code to\n gc/shenandoah/heuristics\n\n + [backport] 8244737: Shenandoah: move mode code to\n gc/shenandoah/mode\n\n + [backport] 8244739: Shenandoah: break superclass\n dependency on ShenandoahNormalMode\n\n + [backport] 8244740: Shenandoah: rename\n ShenandoahNormalMode to ShenandoahSATBMode\n\n + [backport] 8245461: Shenandoah: refine mode name()-s\n\n + [backport] 8245463: Shenandoah: refine\n ShenandoahPhaseTimings constructor arguments\n\n + [backport] 8245464: Shenandoah: allocate collection set\n bitmap at lower addresses\n\n + [backport] 8245465: Shenandoah: test_in_cset can use\n more efficient encoding\n\n + [backport] 8245726: Shenandoah: lift/cleanup\n ShenandoahHeuristics names and properties\n\n + [backport] 8245754: Shenandoah: ditch\n ShenandoahAlwaysPreTouch\n\n + [backport] 8245757: Shenandoah: AlwaysPreTouch should\n not disable heap resizing or uncommits\n\n + [backport] 8245773: Shenandoah: Windows assertion\n failure after JDK-8245464\n\n + [backport] 8245812: Shenandoah: compute root phase\n parallelism\n\n + [backport] 8245814: Shenandoah: reconsider format\n specifiers for stats\n\n + [backport] 8245825: Shenandoah: Remove diagnostic flag\n ShenandoahConcurrentScanCodeRoots\n\n + [backport] 8246162: Shenandoah: full GC does not mark\n code roots when class unloading is off\n\n + [backport] 8247310: Shenandoah: pacer should not affect\n interrupt status\n\n + [backport] 8247358: Shenandoah: reconsider free budget\n slice for marking\n\n + [backport] 8247367: Shenandoah: pacer should wait on\n lock instead of exponential backoff\n\n + [backport] 8247474: Shenandoah: Windows build warning\n after JDK-8247310\n\n + [backport] 8247560: Shenandoah: heap iteration holds\n root locks all the time\n\n + [backport] 8247593: Shenandoah: should not block pacing\n reporters\n\n + [backport] 8247751: Shenandoah: options tests should run\n with smaller heaps\n\n + [backport] 8247754: Shenandoah: mxbeans tests can be\n shorter\n\n + [backport] 8247757: Shenandoah: split heavy tests by\n heuristics to improve parallelism\n\n + [backport] 8247860: Shenandoah: add update watermark\n line in rich assert failure message\n\n + [backport] 8248041: Shenandoah: pre-Full GC root updates\n may miss some roots\n\n + [backport] 8248652: Shenandoah: SATB buffer handling may\n assume no forwarded objects\n\n + [backport] 8249560: Shenandoah: Fix racy GC request\n handling\n\n + [backport] 8249649: Shenandoah: provide per-cycle pacing\n stats\n\n + [backport] 8249801: Shenandoah: Clear soft-refs on\n requested GC cycle\n\n + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans\n tests should account for corner cases\n\n + Fix slowdebug build after JDK-8230853 backport\n\n + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for\n x86_32 and JFR\n\n + JDK-8252366: Shenandoah: revert/cleanup changes in\n graphKit.cpp\n\n + Shenandoah: add JFR roots to root processor after JFR\n integration\n\n + Shenandoah: add root statistics for string dedup\n table/queues\n\n + Shenandoah: enable low-frequency STW class unloading\n\n + Shenandoah: fix build failures after JDK-8244737\n backport\n\n + Shenandoah: Fix build failure with +JFR -PCH\n\n + Shenandoah: fix forceful pacer claim\n\n + Shenandoah: fix formats in\n ShenandoahStringSymbolTableUnlinkTask\n\n + Shenandoah: fix runtime linking failure due to\n non-compiled shenandoahBarrierSetC1\n\n + Shenandoah: hook statistics printing to PrintGCDetails,\n not PrintGC\n\n + Shenandoah: JNI weak roots are always cleared before\n Full GC mark\n\n + Shenandoah: missing SystemDictionary roots in\n ShenandoahHeapIterationRootScanner\n\n + Shenandoah: move barrier sets to their proper locations\n\n + Shenandoah: move parallelCleaning.* to shenandoah/\n\n + Shenandoah: pacer should use proper Atomics for intptr_t\n\n + Shenandoah: properly deallocates class loader metadata\n\n + Shenandoah: specialize String Table scans for better\n pause performance\n\n + Shenandoah: Zero build fails after recent Atomic cleanup\n in Pacer\n\n - AArch64 port\n\n + JDK-8161072, PR3797: AArch64: jtreg\n compiler/uncommontrap/TestDeoptOOM failure\n\n + JDK-8171537, PR3797: aarch64:\n compiler/c1/Test6849574.java generates guarantee failure\n in C1\n\n + JDK-8183925, PR3797: [AArch64] Decouple crash protection\n from watcher thread\n\n + JDK-8199712, PR3797: [AArch64] Flight Recorder\n\n + JDK-8203481, PR3797: Incorrect constraint for\n unextended_sp in frame:safe_for_sender\n\n + JDK-8203699, PR3797:\n java/lang/invoke/SpecialInterfaceCall fails with SIGILL\n on aarch64\n\n + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack\n command\n\n + JDK-8215961, PR3797:\n jdk/jfr/event/os/TestCPUInformation.java fails on\n AArch64\n\n + JDK-8216989, PR3797:\n CardTableBarrierSetAssembler::gen_write_ref_array_post_b\n arrier() does not check for zero length on AARCH64\n\n + JDK-8217368, PR3797: AArch64: C2 recursive stack locking\n optimisation not triggered\n\n + JDK-8221658, PR3797: aarch64: add necessary predicate\n for ubfx patterns\n\n + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a\n BufferBlob\n\n + JDK-8246482, PR3797: Build failures with +JFR -PCH\n\n + JDK-8247979, PR3797: aarch64: missing side effect of\n killing flags for clearArray_reg_reg\n\n + JDK-8248219, PR3797: aarch64: missing memory barrier in\n fast_storefield and fast_accessfield\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174157\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1177943\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14556/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14577/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14578/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14579/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14581/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14583/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14593/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14621/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14779/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14781/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14782/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14792/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14796/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14797/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14798/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14803/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20203460-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b33031f8\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server for SAP 15 :\n\nzypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2020-3460=1\n\nSUSE Linux Enterprise Server 15-LTSS :\n\nzypper in -t patch SUSE-SLE-Product-SLES-15-2020-3460=1\n\nSUSE Linux Enterprise Module for Legacy Software 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Legacy-15-SP2-2020-3460=1\n\nSUSE Linux Enterprise Module for Legacy Software 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-Legacy-15-SP1-2020-3460=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14792\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-demo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-demo-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-headless\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-headless-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/07/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(0|1|2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP0/1/2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-1_8_0-openjdk-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-1_8_0-openjdk-debuginfo-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-1_8_0-openjdk-debugsource-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-1_8_0-openjdk-demo-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-1_8_0-openjdk-demo-debuginfo-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-1_8_0-openjdk-devel-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-1_8_0-openjdk-devel-debuginfo-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-1_8_0-openjdk-headless-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-1_8_0-openjdk-headless-debuginfo-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"java-1_8_0-openjdk-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"java-1_8_0-openjdk-debuginfo-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"java-1_8_0-openjdk-debugsource-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"java-1_8_0-openjdk-demo-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"java-1_8_0-openjdk-demo-debuginfo-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"java-1_8_0-openjdk-devel-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"java-1_8_0-openjdk-devel-debuginfo-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"java-1_8_0-openjdk-headless-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"java-1_8_0-openjdk-headless-debuginfo-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-1_8_0-openjdk-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-1_8_0-openjdk-debuginfo-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-1_8_0-openjdk-debugsource-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-1_8_0-openjdk-demo-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-1_8_0-openjdk-demo-debuginfo-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-1_8_0-openjdk-devel-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-1_8_0-openjdk-devel-debuginfo-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-1_8_0-openjdk-headless-1.8.0.272-3.42.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-1_8_0-openjdk-headless-debuginfo-1.8.0.272-3.42.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1_8_0-openjdk\");\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-01-14T06:30:26", "description": "This update for java-1_8_0-openjdk fixes the following issues :\n\nFix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)',\nintroduced in October 2020 CPU.\n\nUpdate to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,\nbsc#1174157, and October 2020 CPU, bsc#1177943)\n\n - New features\n\n + JDK-8245468: Add TLSv1.3 implementation classes from\n 11.0.7\n\n + PR3796: Allow the number of curves supported to be\n specified\n\n - Security fixes\n\n + JDK-8028431, CVE-2020-14579: NullPointerException in\n DerValue.equals(DerValue)\n\n + JDK-8028591, CVE-2020-14578: NegativeArraySizeException\n in\n sun.security.util.DerInputStream.getUnalignedBitString()\n\n + JDK-8230613: Better ASCII conversions\n\n + JDK-8231800: Better listing of arrays\n\n + JDK-8232014: Expand DTD support\n\n + JDK-8233255: Better Swing Buttons\n\n + JDK-8233624: Enhance JNI linkage\n\n + JDK-8234032: Improve basic calendar services\n\n + JDK-8234042: Better factory production of certificates\n\n + JDK-8234418: Better parsing with CertificateFactory\n\n + JDK-8234836: Improve serialization handling\n\n + JDK-8236191: Enhance OID processing\n\n + JDK-8236196: Improve string pooling\n\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy\n class\n\n + JDK-8237117, CVE-2020-14556: Better ForkJoinPool\n behavior\n\n + JDK-8237592, CVE-2020-14577: Enhance certificate\n verification\n\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n\n + JDK-8237995, CVE-2020-14782: Enhance certificate\n processing\n\n + JDK-8238002, CVE-2020-14581: Better matrix operations\n\n + JDK-8238804: Enhance key handling process\n\n + JDK-8238842: AIOOBE in\n GIFImageReader.initializeStringTable\n\n + JDK-8238843: Enhanced font handing\n\n + JDK-8238920, CVE-2020-14583: Better Buffer support\n\n + JDK-8238925: Enhance WAV file playback\n\n + JDK-8240119, CVE-2020-14593: Less Affine Transformations\n\n + JDK-8240124: Better VM Interning\n\n + JDK-8240482: Improved WAV file playback\n\n + JDK-8241114, CVE-2020-14792: Better range handling\n\n + JDK-8241379: Update JCEKS support\n\n + JDK-8241522: Manifest improved jar headers redux\n\n + JDK-8242136, CVE-2020-14621: Better XML namespace\n handling\n\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n\n + JDK-8243302: Advanced class supports\n\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n\n + JDK-8244479: Further constrain certificates\n\n + JDK-8244955: Additional Fix for JDK-8240124\n\n + JDK-8245407: Enhance zoning of times\n\n + JDK-8245412: Better class definitions\n\n + JDK-8245417: Improve certificate chain handling\n\n + JDK-8248574: Improve jpeg processing\n\n + JDK-8249927: Specify limits of\n jdk.serialProxyInterfaceLimit\n\n + JDK-8253019: Enhanced JPEG decoding\n\n - Import of OpenJDK 8 u262 build 01\n\n + JDK-4949105: Access Bridge lacks html tags parsing\n\n + JDK-8003209: JFR events for network utilization\n\n + JDK-8030680: 292 cleanup from default method code\n assessment\n\n + JDK-8035633: TEST_BUG:\n java/net/NetworkInterface/Equals.java and some tests\n failed on windows intermittently\n\n + JDK-8041626: Shutdown tracing event\n\n + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp\n\n + JDK-8149338: JVM Crash caused by Marlin renderer not\n handling NaN coordinates\n\n + JDK-8151582: (ch) test java/nio/channels/\n /AsyncCloseAndInterrupt.java failing due to 'Connection\n succeeded'\n\n + JDK-8165675: Trace event for thread park has incorrect\n unit for timeout\n\n + JDK-8176182: 4 security tests are not run\n\n + JDK-8178910: Problemlist sample tests\n\n + JDK-8183925: Decouple crash protection from watcher\n thread\n\n + JDK-8191393: Random crashes during cfree+0x1c\n\n + JDK-8195817: JFR.stop should require name of recording\n\n + JDK-8195818: JFR.start should increase autogenerated\n name by one\n\n + JDK-8195819: Remove recording=x from jcmd JFR.check\n output\n\n + JDK-8199712: Flight Recorder\n\n + JDK-8202578: Revisit location for class unload events\n\n + JDK-8202835: jfr/event/os/TestSystemProcess.java fails\n on missing events\n\n + JDK-8203287: Zero fails to build after JDK-8199712\n (Flight Recorder)\n\n + JDK-8203346: JFR: Inconsistent signature of\n jfr_add_string_constant\n\n + JDK-8203664: JFR start failure after AppCDS archive\n created with JFR StartFlightRecording\n\n + JDK-8203921: JFR thread sampling is missing fixes from\n JDK-8194552\n\n + JDK-8203929: Limit amount of data for JFR.dump\n\n + JDK-8205516: JFR tool\n\n + JDK-8207392: [PPC64] Implement JFR profiling\n\n + JDK-8207829: FlightRecorderMXBeanImpl is leaking the\n first classloader which calls it\n\n + JDK-8209960: -Xlog:jfr* doesn't work with the JFR\n\n + JDK-8210024: JFR calls virtual is_Java_thread from\n ~Thread()\n\n + JDK-8210776: Upgrade X Window System 6.8.2 to the latest\n XWD 1.0.7\n\n + JDK-8211239: Build fails without JFR: empty JFR events\n signatures mismatch\n\n + JDK-8212232: Wrong metadata for the configuration of the\n cutoff for old object sample events\n\n + JDK-8213015: Inconsistent settings between JFR.configure\n and\n\n -XX:FlightRecorderOptions\n\n + JDK-8213421: Line number information for execution\n samples always 0\n\n + JDK-8213617: JFR should record the PID of the recorded\n process\n\n + JDK-8213734: SAXParser.parse(File, ..) does not close\n resources when Exception occurs.\n\n + JDK-8213914: [TESTBUG] Several JFR VM events are not\n covered by tests\n\n + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered\n by test\n\n + JDK-8213966: The ZGC JFR events should be marked as\n experimental\n\n + JDK-8214542: JFR: Old Object Sample event slow on a deep\n heap in debug builds\n\n + JDK-8214750: Unnecessary tags in jfr classes\n\n + JDK-8214896: JFR Tool left files behind\n\n + JDK-8214906: [TESTBUG]\n jfr/event/sampling/TestNative.java fails with\n UnsatisfiedLinkError\n\n + JDK-8214925: JFR tool fails to execute\n\n + JDK-8215175: Inconsistencies in JFR event metadata\n\n + JDK-8215237: jdk.jfr.Recording javadoc does not compile\n\n + JDK-8215284: Reduce noise induced by periodic task\n getFileSize()\n\n + JDK-8215355: Object monitor deadlock with no threads\n holding the monitor (using jemalloc 5.1)\n\n + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails\n\n + JDK-8215771: The jfr tool should pretty print reference\n chains\n\n + JDK-8216064: -XX:StartFlightRecording:settings= doesn't\n work properly\n\n + JDK-8216486: Possibility of integer overflow in\n JfrThreadSampler::run()\n\n + JDK-8216528: test/jdk/java/rmi/transport/\n /runtimeThreadInheritanceLeak/\n /RuntimeThreadInheritanceLeak.java failing with Xcomp\n\n + JDK-8216559: [JFR] Native libraries not correctly parsed\n from /proc/self/maps\n\n + JDK-8216578: Remove unused/obsolete method in JFR code\n\n + JDK-8216995: Clean up JFR command line processing\n\n + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on\n some systems due to process surviving SIGINT\n\n + JDK-8217748: [TESTBUG] Exclude TestSig test case from\n JFR TestShutdownEvent\n\n + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly\n\n + JDK-8223147: JFR Backport\n\n + JDK-8223689: Add JFR Thread Sampling Support\n\n + JDK-8223690: Add JFR BiasedLock Event Support\n\n + JDK-8223691: Add JFR G1 Region Type Change Event Support\n\n + JDK-8223692: Add JFR G1 Heap Summary Event Support\n\n + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:\n invariant\n\n + JDK-8224475: JTextPane does not show images in HTML\n rendering\n\n + JDK-8226253: JAWS reports wrong number of radio buttons\n when buttons are hidden.\n\n + JDK-8226779: [TESTBUG] Test JFR API from Java agent\n\n + JDK-8226892: ActionListeners on JRadioButtons don't get\n notified when selection is changed with arrow keys\n\n + JDK-8227011: Starting a JFR recording in response to\n JVMTI VMInit and / or Java agent premain corrupts memory\n\n + JDK-8227605: Kitchensink fails\n 'assert((((klass)->trace_id() &\n (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))\n failed: invariant'\n\n + JDK-8229366: JFR backport allows unchecked writing to\n memory\n\n + JDK-8229401: Fix JFR code cache test failures\n\n + JDK-8229708: JFR backport code does not initialize\n\n + JDK-8229873: 8229401 broke jdk8u-jfr-incubator\n\n + JDK-8230448: [test] JFRSecurityTestSuite.java is failing\n on Windows\n\n + JDK-8230707: JFR related tests are failing\n\n + JDK-8230782: Robot.createScreenCapture() fails if\n 'awt.robot.gtk' is set to false\n\n + JDK-8230856: Java_java_net_NetworkInterface_getByName0\n on unix misses ReleaseStringUTFChars in early return\n\n + JDK-8230947: TestLookForUntestedEvents.java is failing\n after JDK-8230707\n\n + JDK-8231995: two jtreg tests failed after 8229366 is\n fixed\n\n + JDK-8233623: Add classpath exception to copyright in\n EventHandlerProxyCreator.java file\n\n + JDK-8236002: CSR for JFR backport suggests not leaving\n out the package-info\n\n + JDK-8236008: Some backup files were accidentally left in\n the hotspot tree\n\n + JDK-8236074: Missed package-info\n\n + JDK-8236174: Should update javadoc since tags\n\n + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR\n Backport\n\n + JDK-8238452: Keytool generates wrong expiration date if\n validity is set to 2050/01/01\n\n + JDK-8238555: Allow Initialization of SunPKCS11 with NSS\n when there are external FIPS modules in the NSSDB\n\n + JDK-8238589: Necessary code cleanup in JFR for JDK8u\n\n + JDK-8238590: Enable JFR by default during compilation in\n 8u\n\n + JDK-8239055: Wrong implementation of VMState.hasListener\n\n + JDK-8239476: JDK-8238589 broke windows build by moving\n OrderedPair\n\n + JDK-8239479: minimal1 and zero builds are failing\n\n + JDK-8239867: correct over use of INCLUDE_JFR macro\n\n + JDK-8240375: Disable JFR by default for July 2020\n release\n\n + JDK-8241444: Metaspace::_class_vsm not initialized if\n compressed class pointers are disabled\n\n + JDK-8241902: AIX Build broken after integration of\n JDK-8223147 (JFR Backport)\n\n + JDK-8242788: Non-PCH build is broken after JDK-8191393\n\n - Import of OpenJDK 8 u262 build 02\n\n + JDK-8130737: AffineTransformOp can't handle child raster\n with non-zero x-offset\n\n + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st\n annotation in\n java/awt/image/Raster/TestChildRasterOp.java\n\n + JDK-8230926: [macosx] Two apostrophes are entered\n instead of one with 'U.S. International - PC' layout\n\n + JDK-8240576: JVM crashes after transformation in C2\n IdealLoopTree::merge_many_backedges\n\n + JDK-8242883: Incomplete backport of JDK-8078268:\n backport test part\n\n - Import of OpenJDK 8 u262 build 03\n\n + JDK-8037866: Replace the Fun class in tests with lambdas\n\n + JDK-8146612: C2: Precedence edges specification violated\n\n + JDK-8150986: serviceability/sa/jmap-hprof/\n /JMapHProfLargeHeapTest.java failing because expects\n HPROF JAVA PROFILE 1.0.1 file format\n\n + JDK-8229888: (zipfs) Updating an existing zip file does\n not preserve original permissions\n\n + JDK-8230597: Update GIFlib library to the 5.2.1\n\n + JDK-8230769: BufImg_SetupICM add\n ReleasePrimitiveArrayCritical call in early return\n\n + JDK-8233880, PR3798: Support compilers with multi-digit\n major version numbers\n\n + JDK-8239852: java/util/concurrent tests fail with\n\n -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) \nfailed :\n\nverification should have failed\n\n + JDK-8241638: launcher time metrics always report 1 on\n Linux when _JAVA_LAUNCHER_DEBUG set\n\n + JDK-8243059: Build fails when --with-vendor-name\n contains a comma\n\n + JDK-8243474: [TESTBUG] removed three tests of 0 bytes\n\n + JDK-8244461: [JDK 8u] Build fails with glibc 2.32\n\n + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()\n returns wrong result\n\n - Import of OpenJDK 8 u262 build 04\n\n + JDK-8067796: (process) Process.waitFor(timeout, unit)\n doesn't throw NPE if timeout is less than, or equal to\n zero when unit == null\n\n + JDK-8148886: SEGV in\n sun.java2d.marlin.Renderer._endRendering\n\n + JDK-8171934:\n ObjectSizeCalculator.getEffectiveMemoryLayoutSpecificati\n on() does not recognize OpenJDK's HotSpot VM\n\n + JDK-8196969: JTreg Failure:\n serviceability/sa/ClhsdbJstack.java causes NPE\n\n + JDK-8243539: Copyright info (Year) should be updated for\n fix of 8241638\n\n + JDK-8244777: ClassLoaderStats VM Op uses constant hash\n value\n\n - Import of OpenJDK 8 u262 build 05\n\n + JDK-7147060: com/sun/org/apache/xml/internal/security/\n /transforms/ClassLoaderTest.java doesn't run in agentvm\n mode\n\n + JDK-8178374: Problematic ByteBuffer handling in\n CipherSpi.bufferCrypt method\n\n + JDK-8181841: A TSA server returns timestamp with\n precision higher than milliseconds\n\n + JDK-8227269: Slow class loading when running with JDWP\n\n + JDK-8229899: Make java.io.File.isInvalid() less racy\n\n + JDK-8236996: Incorrect Roboto font rendering on Windows\n with subpixel antialiasing\n\n + JDK-8241750: x86_32 build failure after JDK-8227269\n\n + JDK-8244407: JVM crashes after transformation in C2\n IdealLoopTree::split_fall_in\n\n + JDK-8244843: JapanEraNameCompatTest fails\n\n - Import of OpenJDK 8 u262 build 06\n\n + JDK-8246223: Windows build fails after JDK-8227269\n\n - Import of OpenJDK 8 u262 build 07\n\n + JDK-8233197: Invert JvmtiExport::post_vm_initialized()\n and Jfr:on_vm_start() start-up order for correct option\n parsing\n\n + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a\n\n + JDK-8245167: Top package in method profiling shows null\n in JMC\n\n + JDK-8246703: [TESTBUG] Add test for JDK-8233197\n\n - Import of OpenJDK 8 u262 build 08\n\n + JDK-8220293: Deadlock in JFR string pool\n\n + JDK-8225068: Remove DocuSign root certificate that is\n expiring in May 2020\n\n + JDK-8225069: Remove Comodo root certificate that is\n expiring in May 2020\n\n - Import of OpenJDK 8 u262 build 09\n\n + JDK-8248399: Build installs jfr binary when JFR is\n disabled\n\n - Import of OpenJDK 8 u262 build 10\n\n + JDK-8248715: New JavaTimeSupplementary localisation for\n 'in' installed in wrong package\n\n - Import of OpenJDK 8 u265 build 01\n\n + JDK-8249677: Regression in 8u after JDK-8237117: Better\n ForkJoinPool behavior\n\n + JDK-8250546: Expect changed behaviour reported in\n JDK-8249846\n\n - Import of OpenJDK 8 u272 build 01\n\n + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY\n test/compiler/7177917/Test7177917.java\n\n + JDK-8035493: JVMTI PopFrame capability must instruct\n compilers not to prune locals\n\n + JDK-8036088: Replace strtok() with its safe equivalent\n strtok_s() in DefaultProxySelector.c\n\n + JDK-8039082: [TEST_BUG] Test java/awt/dnd/\n /BadSerializationTest/BadSerializationTest.java fails\n\n + JDK-8075774: Small readability and performance\n improvements for zipfs\n\n + JDK-8132206: move ScanTest.java into OpenJDK\n\n + JDK-8132376: Add @requires os.family to the client tests\n with access to internal OS-specific API\n\n + JDK-8132745: minor cleanup of\n java/util/Scanner/ScanTest.java\n\n + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/\n /appletviewer/IOExceptionIfEncodedURLTest/\n /IOExceptionIfEncodedURLTest.sh\n\n + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/\n /MTGraphicsAccessTest.java hangs on Win. 8\n\n + JDK-8151788: NullPointerException from ntlm.Client.type3\n\n + JDK-8151834: Test SmallPrimeExponentP.java times out\n intermittently\n\n + JDK-8153430: jdk regression test MletParserLocaleTest,\n ParserInfiniteLoopTest reduce default timeout\n\n + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary\n public\n\n + JDK-8156169: Some sound tests rarely hangs because of\n incorrect synchronization\n\n + JDK-8165936: Potential Heap buffer overflow when\n seaching timezone info files\n\n + JDK-8166148: Fix for JDK-8165936 broke solaris builds\n\n + JDK-8167300: Scheduling failures during gcm should be\n fatal\n\n + JDK-8167615: Opensource unit/regression tests for\n JavaSound\n\n + JDK-8172012: [TEST_BUG] delays needed in\n javax/swing/JTree/4633594/bug4633594.java\n\n + JDK-8177628: Opensource unit/regression tests for\n ImageIO\n\n + JDK-8183341: Better cleanup for\n javax/imageio/AllowSearch.java\n\n + JDK-8183351: Better cleanup for\n jdk/test/javax/imageio/spi/\n /AppletContextTest/BadPluginConfigurationTest.sh\n\n + JDK-8193137: Nashorn crashes when given an empty script\n file\n\n + JDK-8194298: Add support for per Socket configuration of\n TCP keepalive\n\n + JDK-8198004:\n javax/swing/JFileChooser/6868611/bug6868611.java throws\n error\n\n + JDK-8200313:\n java/awt/Gtk/GtkVersionTest/GtkVersionTest.java fails\n\n + JDK-8210147: adjust some WSAGetLastError usages in\n windows network coding\n\n + JDK-8211714: Need to update vm_version.cpp to recognise\n VS2017 minor versions\n\n + JDK-8214862: assert(proj != __null) at compile.cpp:3251\n\n + JDK-8217606: LdapContext#reconnect always opens a new\n connection\n\n + JDK-8217647: JFR: recordings on 32-bit systems\n unreadable\n\n + JDK-8226697: Several tests which need the @key headful\n keyword are missing it.\n\n + JDK-8229378: jdwp library loader in linker_md.c quietly\n truncates on buffer overflow\n\n + JDK-8230303: JDB hangs when running monitor command\n\n + JDK-8230711: ConnectionGraph::unique_java_object(Node*\n N) return NULL if n is not in the CG\n\n + JDK-8234617: C1: Incorrect result of field load due to\n missing narrowing conversion\n\n + JDK-8235243: handle VS2017 15.9 and VS2019 in\n abstract_vm_version\n\n + JDK-8235325: build failure on Linux after 8235243\n\n + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a\n symlink\n\n + JDK-8237951: CTW: C2 compilation fails with 'malformed\n control flow'\n\n + JDK-8238225: Issues reported after replacing symlink at\n Contents/MacOS/libjli.dylib with binary\n\n + JDK-8239385: KerberosTicket client name refers wrongly\n to sAMAccountName in AD\n\n + JDK-8239819: XToolkit: Misread of screen information\n memory\n\n + JDK-8240295: hs_err elapsed time in seconds is not\n accurate enough\n\n + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system\n property with a security one\n\n + JDK-8242498: Invalid 'sun.awt.TimedWindowEvent' object\n leads to JVM crash\n\n + JDK-8243489: Thread CPU Load event may contain wrong\n data for CPU time under certain conditions\n\n + JDK-8244818: Java2D Queue Flusher crash while moving\n application window to external monitor\n\n + JDK-8246310: Clean commented-out code about ModuleEntry\n and PackageEntry in JFR\n\n + JDK-8246384: Enable JFR by default on supported\n architectures for October 2020 release\n\n + JDK-8248643: Remove extra leading space in JDK-8240295\n 8u backport\n\n + JDK-8249610: Make\n sun.security.krb5.Config.getBooleanObject(String...\n keys) method public\n\n - Import of OpenJDK 8 u272 build 02\n\n + JDK-8023697: failed class resolution reports different\n class name in detail message for the first and\n subsequent times\n\n + JDK-8025886: replace [[ and == bash extensions in\n regtest\n\n + JDK-8046274: Removing dependency on jakarta-regexp\n\n + JDK-8048933: -XX:+TraceExceptions output should include\n the message\n\n + JDK-8076151: [TESTBUG] Test\n java/awt/FontClass/CreateFont/ /fileaccess/FontFile.java\n fails\n\n + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'\n treated by JVM as an equivalent\n\n + JDK-8154313: Generated javadoc scattered all over the\n place\n\n + JDK-8163251: Hard-coded loop limit prevents reading of\n smart card data greater than 8k\n\n + JDK-8173300:\n [TESTBUG]compiler/tiered/NonTieredLevelsTest.java fails\n with compiler.whitebox.SimpleTestCaseHelper(int) must be\n compiled\n\n + JDK-8183349: Better cleanup for jdk/test/javax/imageio/\n /plugins/shared/CanWriteSequence.java and\n WriteAfterAbort.java\n\n + JDK-8191678: [TESTBUG] Add keyword headful in java/awt\n FocusTransitionTest test.\n\n + JDK-8201633: Problems with AES-GCM native acceleration\n\n + JDK-8211049: Second parameter of 'initialize' method is\n not used\n\n + JDK-8219566: JFR did not collect call stacks when\n MaxJavaStackTraceDepth is set to zero\n\n + JDK-8220165: Encryption using GCM results in\n RuntimeException- input length out of bound\n\n + JDK-8220555: JFR tool shows potentially misleading\n message when it cannot access a file\n\n + JDK-8224217: RecordingInfo should use textual\n representation of path\n\n + JDK-8231779: crash\n HeapWord*ParallelScavengeHeap::failed_mem_allocate\n\n + JDK-8238380, PR3798:\n java.base/unix/native/libjava/childproc.c 'multiple\n definition' link errors with GCC10\n\n + JDK-8238386, PR3798: (sctp)\n jdk.sctp/unix/native/libsctp/ /SctpNet.c 'multiple\n definition' link errors with GCC10\n\n + JDK-8238388, PR3798: libj2gss/NativeFunc.o 'multiple\n definition' link errors with GCC10\n\n + JDK-8242556: Cannot load RSASSA-PSS public key with\n non-null params from byte array\n\n + JDK-8250755: Better cleanup for jdk/test/javax/imageio/\n /plugins/shared/CanWriteSequence.java\n\n - Import of OpenJDK 8 u272 build 03\n\n + JDK-6574989: TEST_BUG:\n javax/sound/sampled/Clip/bug5070081.java fails sometimes\n\n + JDK-8148754: C2 loop unrolling fails due to unexpected\n graph shape\n\n + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh\n tests fail with error : revokeall.exe: Permission denied\n\n + JDK-8203357: Container Metrics\n\n + JDK-8209113: Use WeakReference for lastFontStrike for\n created Fonts\n\n + JDK-8216283: Allow shorter method sampling interval than\n 10 ms\n\n + JDK-8221569: JFR tool produces incorrect output when\n both\n\n --categories and --events are specified\n\n + JDK-8233097: Fontmetrics for large Fonts has zero width\n\n + JDK-8248851: CMS: Missing memory fences between free\n chunk check and klass read\n\n + JDK-8250875: Incorrect parameter type for update_number\n in JDK_Version::jdk_update\n\n - Import of OpenJDK 8 u272 build 04\n\n + JDK-8061616: HotspotDiagnosticMXBean.getVMOption()\n throws IllegalArgumentException for flags of type double\n\n + JDK-8177334: Update xmldsig implementation to Apache\n Santuario 2.1.1\n\n + JDK-8217878: ENVELOPING XML signature no longer works in\n JDK 11\n\n + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR\n exception on OpenJDK 11, works 8/9/10\n\n + JDK-8243138: Enhance BaseLdapServer to support starttls\n extended request\n\n - Import of OpenJDK 8 u272 build 05\n\n + JDK-8026236: Add PrimeTest for BigInteger\n\n + JDK-8057003: Large reference arrays cause extremely long\n synchronization times\n\n + JDK-8060721: Test runtime/SharedArchiveFile/\n /LimitSharedSizes.java fails in jdk 9 fcs new\n platforms/compiler\n\n + JDK-8152077: (cal) Calendar.roll does not always roll\n the hours during daylight savings\n\n + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed\n\n + JDK-8211163: UNIX version of Java_java_io_Console_echo\n does not return a clean boolean\n\n + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount\n test in docker container only works with debug JVMs\n\n + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK\n Repo\n\n + JDK-8236645: JDK 8u231 introduces a regression with\n incompatible handling of XML messages\n\n + JDK-8240676: Meet not symmetric failure when running\n lucene on jdk8\n\n + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA\n program\n\n + JDK-8249158: THREAD_START and THREAD_END event posted in\n primordial phase\n\n + JDK-8250627: Use -XX:+/-UseContainerSupport for\n enabling/disabling Java container metrics\n\n + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and\n Solaris builds\n\n + JDK-8252084: Minimal VM fails to bootcycle: undefined\n symbol:\n AgeTableTracer::is_tenuring_distribution_event_enabled\n\n - Import of OpenJDK 8 u272 build 06\n\n + JDK-8064319: Need to enable -XX:+TraceExceptions in\n release builds\n\n + JDK-8080462, PR3801: Update SunPKCS11 provider with\n PKCS11 v2.40 support\n\n + JDK-8160768: Add capability to custom resolve\n host/domain names within the default JNDI LDAP provider\n\n + JDK-8161973:\n PKIXRevocationChecker.getSoftFailExceptions() not\n working\n\n + JDK-8169925, PR3801: PKCS #11 Cryptographic Token\n Interface license\n\n + JDK-8184762: ZapStackSegments should use optimized\n memset\n\n + JDK-8193234: When using -Xcheck:jni an internally\n allocated buffer can leak\n\n + JDK-8219919: RuntimeStub name lost with\n PrintFrameConverterAssembly\n\n + JDK-8220313: [TESTBUG] Update base image for Docker\n testing to OL 7.6\n\n + JDK-8222079: Don't use memset to initialize fields\n decode_env constructor in disassembler.cpp\n\n + JDK-8225695: 32-bit build failures after JDK-8080462\n (Update SunPKCS11 provider with PKCS11 v2.40 support)\n\n + JDK-8226575: OperatingSystemMXBean should be made\n container aware\n\n + JDK-8226809: Circular reference in printed stack trace\n is not correctly indented & ambiguous\n\n + JDK-8228835: Memory leak in PKCS11 provider when using\n AES GCM\n\n + JDK-8233621: Mismatch in jsse.enableMFLNExtension\n property name\n\n + JDK-8238898, PR3801: Missing hash characters for header\n on license file\n\n + JDK-8243320: Add SSL root certificates to Oracle Root CA\n program\n\n + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the\n latest release 1.8.26\n\n + JDK-8245467: Remove 8u TLSv1.2 implementation files\n\n + JDK-8245469: Remove DTLS protocol implementation\n\n + JDK-8245470: Fix JDK8 compatibility issues\n\n + JDK-8245471: Revert JDK-8148188\n\n + JDK-8245472: Backport JDK-8038893 to JDK8\n\n + JDK-8245473: OCSP stapling support\n\n + JDK-8245474: Add TLS_KRB5 cipher suites support\n according to RFC-2712\n\n + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello\n message by default\n\n + JDK-8245477: Adjust TLS tests location\n\n + JDK-8245653: Remove 8u TLS tests\n\n + JDK-8245681: Add TLSv1.3 regression test from 11.0.7\n\n + JDK-8251117: Cannot check P11Key size in P11Cipher and\n P11AEADCipher\n\n + JDK-8251120, PR3793: [8u] HotSpot build assumes\n ENABLE_JFR is set to either true or false\n\n + JDK-8251341: Minimal Java specification change\n\n + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u\n\n - Import of OpenJDK 8 u272 build 07\n\n + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ\n\n - Import of OpenJDK 8 u272 build 08\n\n + JDK-8062947: Fix exception message to correctly\n represent LDAP connection failure\n\n + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java\n failed due to timeout on DeadServerNoTimeoutTest is\n incorrect\n\n + JDK-8252573: 8u: Windows build failed after 8222079\n backport\n\n - Import of OpenJDK 8 u272 build 09\n\n + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :\n Compilation failed\n\n - Import of OpenJDK 8 u272 build 10\n\n + JDK-8254673: Call to JvmtiExport::post_vm_start() was\n removed by the fix for JDK-8249158\n\n + JDK-8254937: Revert JDK-8148854 for 8u272\n\n - Backports\n\n + JDK-8038723, PR3806: Openup some PrinterJob tests\n\n + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when\n JTable contains certain string\n\n + JDK-8058779, PR3805: Faster implementation of\n String.replace(CharSequence, CharSequence)\n\n + JDK-8130125, PR3806: [TEST_BUG] add @modules to the\n several client tests unaffected by the automated bulk\n update\n\n + JDK-8144015, PR3806: [PIT] failures of text layout font\n tests\n\n + JDK-8144023, PR3806: [PIT] failure of text measurements\n in\n javax/swing/text/html/parser/Parser/6836089/bug6836089.j\n ava\n\n + JDK-8144240, PR3806: [macosx][PIT] AIOOB in\n closed/javax/swing/text/GlyphPainter2/6427244/bug6427244\n .java\n\n + JDK-8145542, PR3806: The case failed automatically and\n thrown java.lang.ArrayIndexOutOfBoundsException\n exception\n\n + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception\n when displaying Devanagari text in JEditorPane\n\n + JDK-8152358, PR3800: code and comment cleanups found\n during the hunt for 8077392\n\n + JDK-8152545, PR3804: Use preprocessor instead of\n compiling a program to generate native nio constants\n\n + JDK-8152680, PR3806: Regression in\n GlyphVector.getGlyphCharIndex behaviour\n\n + JDK-8158924, PR3806: Incorrect i18n text document layout\n\n + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for\n javax/swing/text/GlyphPainter2/6427244/bug6427244.java\n\n + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/\n /GetGlyphCharIndexTest.java does not compile\n\n + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/\n /GlyphPainter2/6427244/bug6427244.java - compilation\n failed\n\n + JDK-8191512, PR3806: T2K font rasterizer code removal\n\n + JDK-8191522, PR3806: Remove Bigelow&Holmes Lucida fonts\n from JDK sources\n\n + JDK-8236512, PR3801: PKCS11 Connection closed after\n Cipher.doFinal and NoPadding\n\n + JDK-8254177, PR3809: (tz) Upgrade time-zone data to\n tzdata2020b\n\n - Bug fixes\n\n + PR3798: Fix format-overflow error on GCC 10, caused by\n passing NULL to a '%s' directive\n\n + PR3795: ECDSAUtils for XML digital signatures should\n support the same curve set as the rest of the JDK\n\n + PR3799: Adapt elliptic curve patches to JDK-8245468: Add\n TLSv1.3 implementation classes from 11.0.7\n\n + PR3808: IcedTea does not install the JFR *.jfc files\n\n + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096\n has fixed its use with Shenandoah\n\n + PR3811: Don't attempt to install JFR files when JFR is\n disabled\n\n - Shenandoah\n\n + [backport] 8221435: Shenandoah should not mark through\n weak roots\n\n + [backport] 8221629: Shenandoah: Cleanup class unloading\n logic\n\n + [backport] 8222992: Shenandoah: Pre-evacuate all roots\n\n + [backport] 8223215: Shenandoah: Support verifying subset\n of roots\n\n + [backport] 8223774: Shenandoah: Refactor\n ShenandoahRootProcessor and family\n\n + [backport] 8224210: Shenandoah: Refactor\n ShenandoahRootScanner to support scanning CSet codecache\n roots\n\n + [backport] 8224508: Shenandoah: Need to update thread\n roots in final mark for piggyback ref update cycle\n\n + [backport] 8224579: ResourceMark not declared in\n shenandoahRootProcessor.inline.hpp with\n\n --disable-precompiled-headers\n\n + [backport] 8224679: Shenandoah: Make\n ShenandoahParallelCodeCacheIterator noncopyable\n\n + [backport] 8224751: Shenandoah: Shenandoah Verifier\n should select proper roots according to current GC cycle\n\n + [backport] 8225014: Separate ShenandoahRootScanner\n method for object_iterate\n\n + [backport] 8225216: gc/logging/TestMetaSpaceLog.java\n doesn't work for Shenandoah\n\n + [backport] 8225573: Shenandoah: Enhance\n ShenandoahVerifier to ensure roots to-space invariant\n\n + [backport] 8225590: Shenandoah: Refactor\n ShenandoahClassLoaderDataRoots API\n\n + [backport] 8226413: Shenandoah: Separate root scanner\n for SH::object_iterate()\n\n + [backport] 8230853: Shenandoah: replace leftover\n assert(is_in(...)) with rich asserts\n\n + [backport] 8231198: Shenandoah: heap walking should\n visit all roots most of the time\n\n + [backport] 8231244: Shenandoah: all-roots heap walking\n misses some weak roots\n\n + [backport] 8237632: Shenandoah: accept NULL fwdptr to\n cooperate with JVMTI and JFR\n\n + [backport] 8239786: Shenandoah: print per-cycle\n statistics\n\n + [backport] 8239926: Shenandoah: Shenandoah needs to mark\n nmethod's metadata\n\n + [backport] 8240671: Shenandoah: refactor\n ShenandoahPhaseTimings\n\n + [backport] 8240749: Shenandoah: refactor ShenandoahUtils\n\n + [backport] 8240750: Shenandoah: remove leftover files\n and mentions of ShenandoahAllocTracker\n\n + [backport] 8240868: Shenandoah: remove CM-with-UR\n piggybacking cycles\n\n + [backport] 8240872: Shenandoah: Avoid updating new\n regions from start of evacuation\n\n + [backport] 8240873: Shenandoah: Short-cut arraycopy\n barriers\n\n + [backport] 8240915: Shenandoah: Remove unused fields in\n init mark tasks\n\n + [backport] 8240948: Shenandoah: cleanup\n not-forwarded-objects paths after JDK-8240868\n\n + [backport] 8241007: Shenandoah: remove\n ShenandoahCriticalControlThreadPriority support\n\n + [backport] 8241062: Shenandoah: rich asserts trigger\n 'empty statement' inspection\n\n + [backport] 8241081: Shenandoah: Do not modify\n update-watermark concurrently\n\n + [backport] 8241093: Shenandoah: editorial changes in\n flag descriptions\n\n + [backport] 8241139: Shenandoah: distribute mark-compact\n work exactly to minimize fragmentation\n\n + [backport] 8241142: Shenandoah: should not use parallel\n reference processing with single GC thread\n\n + [backport] 8241351: Shenandoah: fragmentation metrics\n overhaul\n\n + [backport] 8241435: Shenandoah: avoid disabling pacing\n with 'aggressive'\n\n + [backport] 8241520: Shenandoah: simplify region sequence\n numbers handling\n\n + [backport] 8241534: Shenandoah: region status should\n include update watermark\n\n + [backport] 8241574: Shenandoah: remove\n ShenandoahAssertToSpaceClosure\n\n + [backport] 8241583: Shenandoah: turn heap lock asserts\n into macros\n\n + [backport] 8241668: Shenandoah: make\n ShenandoahHeapRegion not derive from ContiguousSpace\n\n + [backport] 8241673: Shenandoah: refactor\n anti-false-sharing padding\n\n + [backport] 8241675: Shenandoah: assert(n->outcnt() > 0)\n at shenandoahSupport.cpp:2858 with\n java/util/Collections/FindSubList.java\n\n + [backport] 8241692: Shenandoah: remove\n ShenandoahHeapRegion::_reserved\n\n + [backport] 8241700: Shenandoah: Fold\n ShenandoahKeepAliveBarrier flag into\n ShenandoahSATBBarrier\n\n + [backport] 8241740: Shenandoah: remove\n ShenandoahHeapRegion::_heap\n\n + [backport] 8241743: Shenandoah: refactor and inline\n ShenandoahHeap::heap()\n\n + [backport] 8241748: Shenandoah: inline MarkingContext\n TAMS methods\n\n + [backport] 8241838: Shenandoah: no need to trash cset\n during final mark\n\n + [backport] 8241841: Shenandoah: ditch one of allocation\n type counters in ShenandoahHeapRegion\n\n + [backport] 8241842: Shenandoah: inline\n ShenandoahHeapRegion::region_number\n\n + [backport] 8241844: Shenandoah: rename\n ShenandoahHeapRegion::region_number\n\n + [backport] 8241845: Shenandoah: align\n ShenandoahHeapRegions to cache lines\n\n + [backport] 8241926: Shenandoah: only print heap changes\n for operations that directly affect it\n\n + [backport] 8241983: Shenandoah: simplify FreeSet logging\n\n + [backport] 8241985: Shenandoah: simplify collectable\n garbage logging\n\n + [backport] 8242040: Shenandoah: print allocation failure\n type\n\n + [backport] 8242041: Shenandoah: adaptive heuristics\n should account evac reserve in free target\n\n + [backport] 8242042: Shenandoah: tune down\n ShenandoahGarbageThreshold\n\n + [backport] 8242054: Shenandoah: New incremental-update\n mode\n\n + [backport] 8242075: Shenandoah: rename\n ShenandoahHeapRegionSize flag\n\n + [backport] 8242082: Shenandoah: Purge Traversal mode\n\n + [backport] 8242083: Shenandoah: split 'Prepare\n Evacuation' tracking into cset/freeset counters\n\n + [backport] 8242089: Shenandoah: per-worker stats should\n be summed up, not averaged\n\n + [backport] 8242101: Shenandoah: coalesce and parallelise\n heap region walks during the pauses\n\n + [backport] 8242114: Shenandoah: remove\n ShenandoahHeapRegion::reset_alloc_metadata_to_shared\n\n + [backport] 8242130: Shenandoah: Simplify\n arraycopy-barrier dispatching\n\n + [backport] 8242211: Shenandoah: remove\n ShenandoahHeuristics::RegionData::_seqnum_last_alloc\n\n + [backport] 8242212: Shenandoah: initialize\n ShenandoahHeuristics::_region_data eagerly\n\n + [backport] 8242213: Shenandoah: remove\n ShenandoahHeuristics::_bytes_in_cset\n\n + [backport] 8242217: Shenandoah: Enable GC mode to be\n diagnostic/experimental and have a name\n\n + [backport] 8242227: Shenandoah: transit regions to cset\n state when adding to collection set\n\n + [backport] 8242228: Shenandoah: remove unused\n ShenandoahCollectionSet methods\n\n + [backport] 8242229: Shenandoah: inline\n ShenandoahHeapRegion liveness-related methods\n\n + [backport] 8242267: Shenandoah: regions space needs to\n be aligned by os::vm_allocation_granularity()\n\n + [backport] 8242271: Shenandoah: add test to verify GC\n mode unlock\n\n + [backport] 8242273: Shenandoah: accept either SATB or IU\n barriers, but not both\n\n + [backport] 8242301: Shenandoah: Inline LRB runtime call\n\n + [backport] 8242316: Shenandoah: Turn NULL-check into\n assert in SATB slow-path entry\n\n + [backport] 8242353: Shenandoah: micro-optimize region\n liveness handling\n\n + [backport] 8242365: Shenandoah: use uint16_t instead of\n jushort for liveness cache\n\n + [backport] 8242375: Shenandoah: Remove\n ShenandoahHeuristic::record_gc_start/end methods\n\n + [backport] 8242641: Shenandoah: clear live data and\n update TAMS optimistically\n\n + [backport] 8243238: Shenandoah: explicit GC request\n should wait for a complete GC cycle\n\n + [backport] 8243301: Shenandoah: ditch\n ShenandoahAllowMixedAllocs\n\n + [backport] 8243307: Shenandoah: remove\n ShCollectionSet::live_data\n\n + [backport] 8243395: Shenandoah: demote guarantee in\n ShenandoahPhaseTimings::record_workers_end\n\n + [backport] 8243463: Shenandoah: ditch total_pause\n counters\n\n + [backport] 8243464: Shenandoah: print statistic counters\n in time order\n\n + [backport] 8243465: Shenandoah: ditch unused\n pause_other, conc_other counters\n\n + [backport] 8243487: Shenandoah: make _num_phases illegal\n phase type\n\n + [backport] 8243494: Shenandoah: set counters once per\n cycle\n\n + [backport] 8243573: Shenandoah: rename GCParPhases and\n related code\n\n + [backport] 8243848: Shenandoah: Windows build fails\n after JDK-8239786\n\n + [backport] 8244180: Shenandoah: carry Phase to\n ShWorkerTimingsTracker explicitly\n\n + [backport] 8244200: Shenandoah: build breakages after\n JDK-8241743\n\n + [backport] 8244226: Shenandoah: per-cycle statistics\n contain worker data from previous cycles\n\n + [backport] 8244326: Shenandoah: global statistics should\n not accept bogus samples\n\n + [backport] 8244509: Shenandoah: refactor\n ShenandoahBarrierC2Support::test_* methods\n\n + [backport] 8244551: Shenandoah: Fix racy update of\n update_watermark\n\n + [backport] 8244667: Shenandoah:\n SBC2Support::test_gc_state takes loop for wrong control\n\n + [backport] 8244730: Shenandoah: gc/shenandoah/options/\n /TestHeuristicsUnlock.java should only verify the\n heuristics\n\n + [backport] 8244732: Shenandoah: move heuristics code to\n gc/shenandoah/heuristics\n\n + [backport] 8244737: Shenandoah: move mode code to\n gc/shenandoah/mode\n\n + [backport] 8244739: Shenandoah: break superclass\n dependency on ShenandoahNormalMode\n\n + [backport] 8244740: Shenandoah: rename\n ShenandoahNormalMode to ShenandoahSATBMode\n\n + [backport] 8245461: Shenandoah: refine mode name()-s\n\n + [backport] 8245463: Shenandoah: refine\n ShenandoahPhaseTimings constructor arguments\n\n + [backport] 8245464: Shenandoah: allocate collection set\n bitmap at lower addresses\n\n + [backport] 8245465: Shenandoah: test_in_cset can use\n more efficient encoding\n\n + [backport] 8245726: Shenandoah: lift/cleanup\n ShenandoahHeuristics names and properties\n\n + [backport] 8245754: Shenandoah: ditch\n ShenandoahAlwaysPreTouch\n\n + [backport] 8245757: Shenandoah: AlwaysPreTouch should\n not disable heap resizing or uncommits\n\n + [backport] 8245773: Shenandoah: Windows assertion\n failure after JDK-8245464\n\n + [backport] 8245812: Shenandoah: compute root phase\n parallelism\n\n + [backport] 8245814: Shenandoah: reconsider format\n specifiers for stats\n\n + [backport] 8245825: Shenandoah: Remove diagnostic flag\n ShenandoahConcurrentScanCodeRoots\n\n + [backport] 8246162: Shenandoah: full GC does not mark\n code roots when class unloading is off\n\n + [backport] 8247310: Shenandoah: pacer should not affect\n interrupt status\n\n + [backport] 8247358: Shenandoah: reconsider free budget\n slice for marking\n\n + [backport] 8247367: Shenandoah: pacer should wait on\n lock instead of exponential backoff\n\n + [backport] 8247474: Shenandoah: Windows build warning\n after JDK-8247310\n\n + [backport] 8247560: Shenandoah: heap iteration holds\n root locks all the time\n\n + [backport] 8247593: Shenandoah: should not block pacing\n reporters\n\n + [backport] 8247751: Shenandoah: options tests should run\n with smaller heaps\n\n + [backport] 8247754: Shenandoah: mxbeans tests can be\n shorter\n\n + [backport] 8247757: Shenandoah: split heavy tests by\n heuristics to improve parallelism\n\n + [backport] 8247860: Shenandoah: add update watermark\n line in rich assert failure message\n\n + [backport] 8248041: Shenandoah: pre-Full GC root updates\n may miss some roots\n\n + [backport] 8248652: Shenandoah: SATB buffer handling may\n assume no forwarded objects\n\n + [backport] 8249560: Shenandoah: Fix racy GC request\n handling\n\n + [backport] 8249649: Shenandoah: provide per-cycle pacing\n stats\n\n + [backport] 8249801: Shenandoah: Clear soft-refs on\n requested GC cycle\n\n + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans\n tests should account for corner cases\n\n + Fix slowdebug build after JDK-8230853 backport\n\n + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for\n x86_32 and JFR\n\n + JDK-8252366: Shenandoah: revert/cleanup changes in\n graphKit.cpp\n\n + Shenandoah: add JFR roots to root processor after JFR\n integration\n\n + Shenandoah: add root statistics for string dedup\n table/queues\n\n + Shenandoah: enable low-frequency STW class unloading\n\n + Shenandoah: fix build failures after JDK-8244737\n backport\n\n + Shenandoah: Fix build failure with +JFR -PCH\n\n + Shenandoah: fix forceful pacer claim\n\n + Shenandoah: fix formats in\n ShenandoahStringSymbolTableUnlinkTask\n\n + Shenandoah: fix runtime linking failure due to\n non-compiled shenandoahBarrierSetC1\n\n + Shenandoah: hook statistics printing to PrintGCDetails,\n not PrintGC\n\n + Shenandoah: JNI weak roots are always cleared before\n Full GC mark\n\n + Shenandoah: missing SystemDictionary roots in\n ShenandoahHeapIterationRootScanner\n\n + Shenandoah: move barrier sets to their proper locations\n\n + Shenandoah: move parallelCleaning.* to shenandoah/\n\n + Shenandoah: pacer should use proper Atomics for intptr_t\n\n + Shenandoah: properly deallocates class loader metadata\n\n + Shenandoah: specialize String Table scans for better\n pause performance\n\n + Shenandoah: Zero build fails after recent Atomic cleanup\n in Pacer\n\n - AArch64 port\n\n + JDK-8161072, PR3797: AArch64: jtreg\n compiler/uncommontrap/TestDeoptOOM failure\n\n + JDK-8171537, PR3797: aarch64:\n compiler/c1/Test6849574.java generates guarantee failure\n in C1\n\n + JDK-8183925, PR3797: [AArch64] Decouple crash protection\n from watcher thread\n\n + JDK-8199712, PR3797: [AArch64] Flight Recorder\n\n + JDK-8203481, PR3797: Incorrect constraint for\n unextended_sp in frame:safe_for_sender\n\n + JDK-8203699, PR3797:\n java/lang/invoke/SpecialInterfaceCall fails with SIGILL\n on aarch64\n\n + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack\n command\n\n + JDK-8215961, PR3797:\n jdk/jfr/event/os/TestCPUInformation.java fails on\n AArch64\n\n + JDK-8216989, PR3797:\n CardTableBarrierSetAssembler::gen_write_ref_array_post_b\n arrier() does not check for zero length on AARCH64\n\n + JDK-8217368, PR3797: AArch64: C2 recursive stack locking\n optimisation not triggered\n\n + JDK-8221658, PR3797: aarch64: add necessary predicate\n for ubfx patterns\n\n + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a\n BufferBlob\n\n + JDK-8246482, PR3797: Build failures with +JFR -PCH\n\n + JDK-8247979, PR3797: aarch64: missing side effect of\n killing flags for clearArray_reg_reg\n\n + JDK-8248219, PR3797: aarch64: missing memory barrier in\n fast_storefield and fast_accessfield\n\nIgnore whitespaces after the header or footer in PEM X.509 cert\n(bsc#1171352)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 3, "cvss3": {"score": 4.2, "vector": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}, "published": "2020-12-09T00:00:00", "title": "SUSE SLES12 Security Update : java-1_8_0-openjdk (SUSE-SU-2020:3191-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-14803", "CVE-2020-14782", "CVE-2020-14556", "CVE-2020-14792", "CVE-2020-14593", "CVE-2020-14781", "CVE-2020-14798", "CVE-2020-14779", "CVE-2020-14797", "CVE-2020-14578", "CVE-2020-14621", "CVE-2020-14583", "CVE-2020-14577", "CVE-2020-14796", "CVE-2020-14579", "CVE-2020-14581"], "modified": "2020-12-09T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-headless", "p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-debugsource", "p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-demo-debuginfo", "cpe:/o:novell:suse_linux:12", "p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-devel-debuginfo", "p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-debuginfo", "p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-demo", "p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-devel", "p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-headless-debuginfo", "p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk"], "id": "SUSE_SU-2020-3191-1.NASL", "href": "https://www.tenable.com/plugins/nessus/143779", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:3191-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(143779);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2020-14556\", \"CVE-2020-14577\", \"CVE-2020-14578\", \"CVE-2020-14579\", \"CVE-2020-14581\", \"CVE-2020-14583\", \"CVE-2020-14593\", \"CVE-2020-14621\", \"CVE-2020-14779\", \"CVE-2020-14781\", \"CVE-2020-14782\", \"CVE-2020-14792\", \"CVE-2020-14796\", \"CVE-2020-14797\", \"CVE-2020-14798\", \"CVE-2020-14803\");\n\n script_name(english:\"SUSE SLES12 Security Update : java-1_8_0-openjdk (SUSE-SU-2020:3191-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for java-1_8_0-openjdk fixes the following issues :\n\nFix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)',\nintroduced in October 2020 CPU.\n\nUpdate to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,\nbsc#1174157, and October 2020 CPU, bsc#1177943)\n\n - New features\n\n + JDK-8245468: Add TLSv1.3 implementation classes from\n 11.0.7\n\n + PR3796: Allow the number of curves supported to be\n specified\n\n - Security fixes\n\n + JDK-8028431, CVE-2020-14579: NullPointerException in\n DerValue.equals(DerValue)\n\n + JDK-8028591, CVE-2020-14578: NegativeArraySizeException\n in\n sun.security.util.DerInputStream.getUnalignedBitString()\n\n + JDK-8230613: Better ASCII conversions\n\n + JDK-8231800: Better listing of arrays\n\n + JDK-8232014: Expand DTD support\n\n + JDK-8233255: Better Swing Buttons\n\n + JDK-8233624: Enhance JNI linkage\n\n + JDK-8234032: Improve basic calendar services\n\n + JDK-8234042: Better factory production of certificates\n\n + JDK-8234418: Better parsing with CertificateFactory\n\n + JDK-8234836: Improve serialization handling\n\n + JDK-8236191: Enhance OID processing\n\n + JDK-8236196: Improve string pooling\n\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy\n class\n\n + JDK-8237117, CVE-2020-14556: Better ForkJoinPool\n behavior\n\n + JDK-8237592, CVE-2020-14577: Enhance certificate\n verification\n\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n\n + JDK-8237995, CVE-2020-14782: Enhance certificate\n processing\n\n + JDK-8238002, CVE-2020-14581: Better matrix operations\n\n + JDK-8238804: Enhance key handling process\n\n + JDK-8238842: AIOOBE in\n GIFImageReader.initializeStringTable\n\n + JDK-8238843: Enhanced font handing\n\n + JDK-8238920, CVE-2020-14583: Better Buffer support\n\n + JDK-8238925: Enhance WAV file playback\n\n + JDK-8240119, CVE-2020-14593: Less Affine Transformations\n\n + JDK-8240124: Better VM Interning\n\n + JDK-8240482: Improved WAV file playback\n\n + JDK-8241114, CVE-2020-14792: Better range handling\n\n + JDK-8241379: Update JCEKS support\n\n + JDK-8241522: Manifest improved jar headers redux\n\n + JDK-8242136, CVE-2020-14621: Better XML namespace\n handling\n\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n\n + JDK-8243302: Advanced class supports\n\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n\n + JDK-8244479: Further constrain certificates\n\n + JDK-8244955: Additional Fix for JDK-8240124\n\n + JDK-8245407: Enhance zoning of times\n\n + JDK-8245412: Better class definitions\n\n + JDK-8245417: Improve certificate chain handling\n\n + JDK-8248574: Improve jpeg processing\n\n + JDK-8249927: Specify limits of\n jdk.serialProxyInterfaceLimit\n\n + JDK-8253019: Enhanced JPEG decoding\n\n - Import of OpenJDK 8 u262 build 01\n\n + JDK-4949105: Access Bridge lacks html tags parsing\n\n + JDK-8003209: JFR events for network utilization\n\n + JDK-8030680: 292 cleanup from default method code\n assessment\n\n + JDK-8035633: TEST_BUG:\n java/net/NetworkInterface/Equals.java and some tests\n failed on windows intermittently\n\n + JDK-8041626: Shutdown tracing event\n\n + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp\n\n + JDK-8149338: JVM Crash caused by Marlin renderer not\n handling NaN coordinates\n\n + JDK-8151582: (ch) test java/nio/channels/\n /AsyncCloseAndInterrupt.java failing due to 'Connection\n succeeded'\n\n + JDK-8165675: Trace event for thread park has incorrect\n unit for timeout\n\n + JDK-8176182: 4 security tests are not run\n\n + JDK-8178910: Problemlist sample tests\n\n + JDK-8183925: Decouple crash protection from watcher\n thread\n\n + JDK-8191393: Random crashes during cfree+0x1c\n\n + JDK-8195817: JFR.stop should require name of recording\n\n + JDK-8195818: JFR.start should increase autogenerated\n name by one\n\n + JDK-8195819: Remove recording=x from jcmd JFR.check\n output\n\n + JDK-8199712: Flight Recorder\n\n + JDK-8202578: Revisit location for class unload events\n\n + JDK-8202835: jfr/event/os/TestSystemProcess.java fails\n on missing events\n\n + JDK-8203287: Zero fails to build after JDK-8199712\n (Flight Recorder)\n\n + JDK-8203346: JFR: Inconsistent signature of\n jfr_add_string_constant\n\n + JDK-8203664: JFR start failure after AppCDS archive\n created with JFR StartFlightRecording\n\n + JDK-8203921: JFR thread sampling is missing fixes from\n JDK-8194552\n\n + JDK-8203929: Limit amount of data for JFR.dump\n\n + JDK-8205516: JFR tool\n\n + JDK-8207392: [PPC64] Implement JFR profiling\n\n + JDK-8207829: FlightRecorderMXBeanImpl is leaking the\n first classloader which calls it\n\n + JDK-8209960: -Xlog:jfr* doesn't work with the JFR\n\n + JDK-8210024: JFR calls virtual is_Java_thread from\n ~Thread()\n\n + JDK-8210776: Upgrade X Window System 6.8.2 to the latest\n XWD 1.0.7\n\n + JDK-8211239: Build fails without JFR: empty JFR events\n signatures mismatch\n\n + JDK-8212232: Wrong metadata for the configuration of the\n cutoff for old object sample events\n\n + JDK-8213015: Inconsistent settings between JFR.configure\n and\n\n -XX:FlightRecorderOptions\n\n + JDK-8213421: Line number information for execution\n samples always 0\n\n + JDK-8213617: JFR should record the PID of the recorded\n process\n\n + JDK-8213734: SAXParser.parse(File, ..) does not close\n resources when Exception occurs.\n\n + JDK-8213914: [TESTBUG] Several JFR VM events are not\n covered by tests\n\n + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered\n by test\n\n + JDK-8213966: The ZGC JFR events should be marked as\n experimental\n\n + JDK-8214542: JFR: Old Object Sample event slow on a deep\n heap in debug builds\n\n + JDK-8214750: Unnecessary tags in jfr classes\n\n + JDK-8214896: JFR Tool left files behind\n\n + JDK-8214906: [TESTBUG]\n jfr/event/sampling/TestNative.java fails with\n UnsatisfiedLinkError\n\n + JDK-8214925: JFR tool fails to execute\n\n + JDK-8215175: Inconsistencies in JFR event metadata\n\n + JDK-8215237: jdk.jfr.Recording javadoc does not compile\n\n + JDK-8215284: Reduce noise induced by periodic task\n getFileSize()\n\n + JDK-8215355: Object monitor deadlock with no threads\n holding the monitor (using jemalloc 5.1)\n\n + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails\n\n + JDK-8215771: The jfr tool should pretty print reference\n chains\n\n + JDK-8216064: -XX:StartFlightRecording:settings= doesn't\n work properly\n\n + JDK-8216486: Possibility of integer overflow in\n JfrThreadSampler::run()\n\n + JDK-8216528: test/jdk/java/rmi/transport/\n /runtimeThreadInheritanceLeak/\n /RuntimeThreadInheritanceLeak.java failing with Xcomp\n\n + JDK-8216559: [JFR] Native libraries not correctly parsed\n from /proc/self/maps\n\n + JDK-8216578: Remove unused/obsolete method in JFR code\n\n + JDK-8216995: Clean up JFR command line processing\n\n + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on\n some systems due to process surviving SIGINT\n\n + JDK-8217748: [TESTBUG] Exclude TestSig test case from\n JFR TestShutdownEvent\n\n + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly\n\n + JDK-8223147: JFR Backport\n\n + JDK-8223689: Add JFR Thread Sampling Support\n\n + JDK-8223690: Add JFR BiasedLock Event Support\n\n + JDK-8223691: Add JFR G1 Region Type Change Event Support\n\n + JDK-8223692: Add JFR G1 Heap Summary Event Support\n\n + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:\n invariant\n\n + JDK-8224475: JTextPane does not show images in HTML\n rendering\n\n + JDK-8226253: JAWS reports wrong number of radio buttons\n when buttons are hidden.\n\n + JDK-8226779: [TESTBUG] Test JFR API from Java agent\n\n + JDK-8226892: ActionListeners on JRadioButtons don't get\n notified when selection is changed with arrow keys\n\n + JDK-8227011: Starting a JFR recording in response to\n JVMTI VMInit and / or Java agent premain corrupts memory\n\n + JDK-8227605: Kitchensink fails\n 'assert((((klass)->trace_id() &\n (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))\n failed: invariant'\n\n + JDK-8229366: JFR backport allows unchecked writing to\n memory\n\n + JDK-8229401: Fix JFR code cache test failures\n\n + JDK-8229708: JFR backport code does not initialize\n\n + JDK-8229873: 8229401 broke jdk8u-jfr-incubator\n\n + JDK-8230448: [test] JFRSecurityTestSuite.java is failing\n on Windows\n\n + JDK-8230707: JFR related tests are failing\n\n + JDK-8230782: Robot.createScreenCapture() fails if\n 'awt.robot.gtk' is set to false\n\n + JDK-8230856: Java_java_net_NetworkInterface_getByName0\n on unix misses ReleaseStringUTFChars in early return\n\n + JDK-8230947: TestLookForUntestedEvents.java is failing\n after JDK-8230707\n\n + JDK-8231995: two jtreg tests failed after 8229366 is\n fixed\n\n + JDK-8233623: Add classpath exception to copyright in\n EventHandlerProxyCreator.java file\n\n + JDK-8236002: CSR for JFR backport suggests not leaving\n out the package-info\n\n + JDK-8236008: Some backup files were accidentally left in\n the hotspot tree\n\n + JDK-8236074: Missed package-info\n\n + JDK-8236174: Should update javadoc since tags\n\n + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR\n Backport\n\n + JDK-8238452: Keytool generates wrong expiration date if\n validity is set to 2050/01/01\n\n + JDK-8238555: Allow Initialization of SunPKCS11 with NSS\n when there are external FIPS modules in the NSSDB\n\n + JDK-8238589: Necessary code cleanup in JFR for JDK8u\n\n + JDK-8238590: Enable JFR by default during compilation in\n 8u\n\n + JDK-8239055: Wrong implementation of VMState.hasListener\n\n + JDK-8239476: JDK-8238589 broke windows build by moving\n OrderedPair\n\n + JDK-8239479: minimal1 and zero builds are failing\n\n + JDK-8239867: correct over use of INCLUDE_JFR macro\n\n + JDK-8240375: Disable JFR by default for July 2020\n release\n\n + JDK-8241444: Metaspace::_class_vsm not initialized if\n compressed class pointers are disabled\n\n + JDK-8241902: AIX Build broken after integration of\n JDK-8223147 (JFR Backport)\n\n + JDK-8242788: Non-PCH build is broken after JDK-8191393\n\n - Import of OpenJDK 8 u262 build 02\n\n + JDK-8130737: AffineTransformOp can't handle child raster\n with non-zero x-offset\n\n + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st\n annotation in\n java/awt/image/Raster/TestChildRasterOp.java\n\n + JDK-8230926: [macosx] Two apostrophes are entered\n instead of one with 'U.S. International - PC' layout\n\n + JDK-8240576: JVM crashes after transformation in C2\n IdealLoopTree::merge_many_backedges\n\n + JDK-8242883: Incomplete backport of JDK-8078268:\n backport test part\n\n - Import of OpenJDK 8 u262 build 03\n\n + JDK-8037866: Replace the Fun class in tests with lambdas\n\n + JDK-8146612: C2: Precedence edges specification violated\n\n + JDK-8150986: serviceability/sa/jmap-hprof/\n /JMapHProfLargeHeapTest.java failing because expects\n HPROF JAVA PROFILE 1.0.1 file format\n\n + JDK-8229888: (zipfs) Updating an existing zip file does\n not preserve original permissions\n\n + JDK-8230597: Update GIFlib library to the 5.2.1\n\n + JDK-8230769: BufImg_SetupICM add\n ReleasePrimitiveArrayCritical call in early return\n\n + JDK-8233880, PR3798: Support compilers with multi-digit\n major version numbers\n\n + JDK-8239852: java/util/concurrent tests fail with\n\n -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) \nfailed :\n\nverification should have failed\n\n + JDK-8241638: launcher time metrics always report 1 on\n Linux when _JAVA_LAUNCHER_DEBUG set\n\n + JDK-8243059: Build fails when --with-vendor-name\n contains a comma\n\n + JDK-8243474: [TESTBUG] removed three tests of 0 bytes\n\n + JDK-8244461: [JDK 8u] Build fails with glibc 2.32\n\n + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()\n returns wrong result\n\n - Import of OpenJDK 8 u262 build 04\n\n + JDK-8067796: (process) Process.waitFor(timeout, unit)\n doesn't throw NPE if timeout is less than, or equal to\n zero when unit == null\n\n + JDK-8148886: SEGV in\n sun.java2d.marlin.Renderer._endRendering\n\n + JDK-8171934:\n ObjectSizeCalculator.getEffectiveMemoryLayoutSpecificati\n on() does not recognize OpenJDK's HotSpot VM\n\n + JDK-8196969: JTreg Failure:\n serviceability/sa/ClhsdbJstack.java causes NPE\n\n + JDK-8243539: Copyright info (Year) should be updated for\n fix of 8241638\n\n + JDK-8244777: ClassLoaderStats VM Op uses constant hash\n value\n\n - Import of OpenJDK 8 u262 build 05\n\n + JDK-7147060: com/sun/org/apache/xml/internal/security/\n /transforms/ClassLoaderTest.java doesn't run in agentvm\n mode\n\n + JDK-8178374: Problematic ByteBuffer handling in\n CipherSpi.bufferCrypt method\n\n + JDK-8181841: A TSA server returns timestamp with\n precision higher than milliseconds\n\n + JDK-8227269: Slow class loading when running with JDWP\n\n + JDK-8229899: Make java.io.File.isInvalid() less racy\n\n + JDK-8236996: Incorrect Roboto font rendering on Windows\n with subpixel antialiasing\n\n + JDK-8241750: x86_32 build failure after JDK-8227269\n\n + JDK-8244407: JVM crashes after transformation in C2\n IdealLoopTree::split_fall_in\n\n + JDK-8244843: JapanEraNameCompatTest fails\n\n - Import of OpenJDK 8 u262 build 06\n\n + JDK-8246223: Windows build fails after JDK-8227269\n\n - Import of OpenJDK 8 u262 build 07\n\n + JDK-8233197: Invert JvmtiExport::post_vm_initialized()\n and Jfr:on_vm_start() start-up order for correct option\n parsing\n\n + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a\n\n + JDK-8245167: Top package in method profiling shows null\n in JMC\n\n + JDK-8246703: [TESTBUG] Add test for JDK-8233197\n\n - Import of OpenJDK 8 u262 build 08\n\n + JDK-8220293: Deadlock in JFR string pool\n\n + JDK-8225068: Remove DocuSign root certificate that is\n expiring in May 2020\n\n + JDK-8225069: Remove Comodo root certificate that is\n expiring in May 2020\n\n - Import of OpenJDK 8 u262 build 09\n\n + JDK-8248399: Build installs jfr binary when JFR is\n disabled\n\n - Import of OpenJDK 8 u262 build 10\n\n + JDK-8248715: New JavaTimeSupplementary localisation for\n 'in' installed in wrong package\n\n - Import of OpenJDK 8 u265 build 01\n\n + JDK-8249677: Regression in 8u after JDK-8237117: Better\n ForkJoinPool behavior\n\n + JDK-8250546: Expect changed behaviour reported in\n JDK-8249846\n\n - Import of OpenJDK 8 u272 build 01\n\n + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY\n test/compiler/7177917/Test7177917.java\n\n + JDK-8035493: JVMTI PopFrame capability must instruct\n compilers not to prune locals\n\n + JDK-8036088: Replace strtok() with its safe equivalent\n strtok_s() in DefaultProxySelector.c\n\n + JDK-8039082: [TEST_BUG] Test java/awt/dnd/\n /BadSerializationTest/BadSerializationTest.java fails\n\n + JDK-8075774: Small readability and performance\n improvements for zipfs\n\n + JDK-8132206: move ScanTest.java into OpenJDK\n\n + JDK-8132376: Add @requires os.family to the client tests\n with access to internal OS-specific API\n\n + JDK-8132745: minor cleanup of\n java/util/Scanner/ScanTest.java\n\n + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/\n /appletviewer/IOExceptionIfEncodedURLTest/\n /IOExceptionIfEncodedURLTest.sh\n\n + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/\n /MTGraphicsAccessTest.java hangs on Win. 8\n\n + JDK-8151788: NullPointerException from ntlm.Client.type3\n\n + JDK-8151834: Test SmallPrimeExponentP.java times out\n intermittently\n\n + JDK-8153430: jdk regression test MletParserLocaleTest,\n ParserInfiniteLoopTest reduce default timeout\n\n + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary\n public\n\n + JDK-8156169: Some sound tests rarely hangs because of\n incorrect synchronization\n\n + JDK-8165936: Potential Heap buffer overflow when\n seaching timezone info files\n\n + JDK-8166148: Fix for JDK-8165936 broke solaris builds\n\n + JDK-8167300: Scheduling failures during gcm should be\n fatal\n\n + JDK-8167615: Opensource unit/regression tests for\n JavaSound\n\n + JDK-8172012: [TEST_BUG] delays needed in\n javax/swing/JTree/4633594/bug4633594.java\n\n + JDK-8177628: Opensource unit/regression tests for\n ImageIO\n\n + JDK-8183341: Better cleanup for\n javax/imageio/AllowSearch.java\n\n + JDK-8183351: Better cleanup for\n jdk/test/javax/imageio/spi/\n /AppletContextTest/BadPluginConfigurationTest.sh\n\n + JDK-8193137: Nashorn crashes when given an empty script\n file\n\n + JDK-8194298: Add support for per Socket configuration of\n TCP keepalive\n\n + JDK-8198004:\n javax/swing/JFileChooser/6868611/bug6868611.java throws\n error\n\n + JDK-8200313:\n java/awt/Gtk/GtkVersionTest/GtkVersionTest.java fails\n\n + JDK-8210147: adjust some WSAGetLastError usages in\n windows network coding\n\n + JDK-8211714: Need to update vm_version.cpp to recognise\n VS2017 minor versions\n\n + JDK-8214862: assert(proj != __null) at compile.cpp:3251\n\n + JDK-8217606: LdapContext#reconnect always opens a new\n connection\n\n + JDK-8217647: JFR: recordings on 32-bit systems\n unreadable\n\n + JDK-8226697: Several tests which need the @key headful\n keyword are missing it.\n\n + JDK-8229378: jdwp library loader in linker_md.c quietly\n truncates on buffer overflow\n\n + JDK-8230303: JDB hangs when running monitor command\n\n + JDK-8230711: ConnectionGraph::unique_java_object(Node*\n N) return NULL if n is not in the CG\n\n + JDK-8234617: C1: Incorrect result of field load due to\n missing narrowing conversion\n\n + JDK-8235243: handle VS2017 15.9 and VS2019 in\n abstract_vm_version\n\n + JDK-8235325: build failure on Linux after 8235243\n\n + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a\n symlink\n\n + JDK-8237951: CTW: C2 compilation fails with 'malformed\n control flow'\n\n + JDK-8238225: Issues reported after replacing symlink at\n Contents/MacOS/libjli.dylib with binary\n\n + JDK-8239385: KerberosTicket client name refers wrongly\n to sAMAccountName in AD\n\n + JDK-8239819: XToolkit: Misread of screen information\n memory\n\n + JDK-8240295: hs_err elapsed time in seconds is not\n accurate enough\n\n + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system\n property with a security one\n\n + JDK-8242498: Invalid 'sun.awt.TimedWindowEvent' object\n leads to JVM crash\n\n + JDK-8243489: Thread CPU Load event may contain wrong\n data for CPU time under certain conditions\n\n + JDK-8244818: Java2D Queue Flusher crash while moving\n application window to external monitor\n\n + JDK-8246310: Clean commented-out code about ModuleEntry\n and PackageEntry in JFR\n\n + JDK-8246384: Enable JFR by default on supported\n architectures for October 2020 release\n\n + JDK-8248643: Remove extra leading space in JDK-8240295\n 8u backport\n\n + JDK-8249610: Make\n sun.security.krb5.Config.getBooleanObject(String...\n keys) method public\n\n - Import of OpenJDK 8 u272 build 02\n\n + JDK-8023697: failed class resolution reports different\n class name in detail message for the first and\n subsequent times\n\n + JDK-8025886: replace [[ and == bash extensions in\n regtest\n\n + JDK-8046274: Removing dependency on jakarta-regexp\n\n + JDK-8048933: -XX:+TraceExceptions output should include\n the message\n\n + JDK-8076151: [TESTBUG] Test\n java/awt/FontClass/CreateFont/ /fileaccess/FontFile.java\n fails\n\n + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'\n treated by JVM as an equivalent\n\n + JDK-8154313: Generated javadoc scattered all over the\n place\n\n + JDK-8163251: Hard-coded loop limit prevents reading of\n smart card data greater than 8k\n\n + JDK-8173300:\n [TESTBUG]compiler/tiered/NonTieredLevelsTest.java fails\n with compiler.whitebox.SimpleTestCaseHelper(int) must be\n compiled\n\n + JDK-8183349: Better cleanup for jdk/test/javax/imageio/\n /plugins/shared/CanWriteSequence.java and\n WriteAfterAbort.java\n\n + JDK-8191678: [TESTBUG] Add keyword headful in java/awt\n FocusTransitionTest test.\n\n + JDK-8201633: Problems with AES-GCM native acceleration\n\n + JDK-8211049: Second parameter of 'initialize' method is\n not used\n\n + JDK-8219566: JFR did not collect call stacks when\n MaxJavaStackTraceDepth is set to zero\n\n + JDK-8220165: Encryption using GCM results in\n RuntimeException- input length out of bound\n\n + JDK-8220555: JFR tool shows potentially misleading\n message when it cannot access a file\n\n + JDK-8224217: RecordingInfo should use textual\n representation of path\n\n + JDK-8231779: crash\n HeapWord*ParallelScavengeHeap::failed_mem_allocate\n\n + JDK-8238380, PR3798:\n java.base/unix/native/libjava/childproc.c 'multiple\n definition' link errors with GCC10\n\n + JDK-8238386, PR3798: (sctp)\n jdk.sctp/unix/native/libsctp/ /SctpNet.c 'multiple\n definition' link errors with GCC10\n\n + JDK-8238388, PR3798: libj2gss/NativeFunc.o 'multiple\n definition' link errors with GCC10\n\n + JDK-8242556: Cannot load RSASSA-PSS public key with\n non-null params from byte array\n\n + JDK-8250755: Better cleanup for jdk/test/javax/imageio/\n /plugins/shared/CanWriteSequence.java\n\n - Import of OpenJDK 8 u272 build 03\n\n + JDK-6574989: TEST_BUG:\n javax/sound/sampled/Clip/bug5070081.java fails sometimes\n\n + JDK-8148754: C2 loop unrolling fails due to unexpected\n graph shape\n\n + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh\n tests fail with error : revokeall.exe: Permission denied\n\n + JDK-8203357: Container Metrics\n\n + JDK-8209113: Use WeakReference for lastFontStrike for\n created Fonts\n\n + JDK-8216283: Allow shorter method sampling interval than\n 10 ms\n\n + JDK-8221569: JFR tool produces incorrect output when\n both\n\n --categories and --events are specified\n\n + JDK-8233097: Fontmetrics for large Fonts has zero width\n\n + JDK-8248851: CMS: Missing memory fences between free\n chunk check and klass read\n\n + JDK-8250875: Incorrect parameter type for update_number\n in JDK_Version::jdk_update\n\n - Import of OpenJDK 8 u272 build 04\n\n + JDK-8061616: HotspotDiagnosticMXBean.getVMOption()\n throws IllegalArgumentException for flags of type double\n\n + JDK-8177334: Update xmldsig implementation to Apache\n Santuario 2.1.1\n\n + JDK-8217878: ENVELOPING XML signature no longer works in\n JDK 11\n\n + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR\n exception on OpenJDK 11, works 8/9/10\n\n + JDK-8243138: Enhance BaseLdapServer to support starttls\n extended request\n\n - Import of OpenJDK 8 u272 build 05\n\n + JDK-8026236: Add PrimeTest for BigInteger\n\n + JDK-8057003: Large reference arrays cause extremely long\n synchronization times\n\n + JDK-8060721: Test runtime/SharedArchiveFile/\n /LimitSharedSizes.java fails in jdk 9 fcs new\n platforms/compiler\n\n + JDK-8152077: (cal) Calendar.roll does not always roll\n the hours during daylight savings\n\n + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed\n\n + JDK-8211163: UNIX version of Java_java_io_Console_echo\n does not return a clean boolean\n\n + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount\n test in docker container only works with debug JVMs\n\n + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK\n Repo\n\n + JDK-8236645: JDK 8u231 introduces a regression with\n incompatible handling of XML messages\n\n + JDK-8240676: Meet not symmetric failure when running\n lucene on jdk8\n\n + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA\n program\n\n + JDK-8249158: THREAD_START and THREAD_END event posted in\n primordial phase\n\n + JDK-8250627: Use -XX:+/-UseContainerSupport for\n enabling/disabling Java container metrics\n\n + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and\n Solaris builds\n\n + JDK-8252084: Minimal VM fails to bootcycle: undefined\n symbol:\n AgeTableTracer::is_tenuring_distribution_event_enabled\n\n - Import of OpenJDK 8 u272 build 06\n\n + JDK-8064319: Need to enable -XX:+TraceExceptions in\n release builds\n\n + JDK-8080462, PR3801: Update SunPKCS11 provider with\n PKCS11 v2.40 support\n\n + JDK-8160768: Add capability to custom resolve\n host/domain names within the default JNDI LDAP provider\n\n + JDK-8161973:\n PKIXRevocationChecker.getSoftFailExceptions() not\n working\n\n + JDK-8169925, PR3801: PKCS #11 Cryptographic Token\n Interface license\n\n + JDK-8184762: ZapStackSegments should use optimized\n memset\n\n + JDK-8193234: When using -Xcheck:jni an internally\n allocated buffer can leak\n\n + JDK-8219919: RuntimeStub name lost with\n PrintFrameConverterAssembly\n\n + JDK-8220313: [TESTBUG] Update base image for Docker\n testing to OL 7.6\n\n + JDK-8222079: Don't use memset to initialize fields\n decode_env constructor in disassembler.cpp\n\n + JDK-8225695: 32-bit build failures after JDK-8080462\n (Update SunPKCS11 provider with PKCS11 v2.40 support)\n\n + JDK-8226575: OperatingSystemMXBean should be made\n container aware\n\n + JDK-8226809: Circular reference in printed stack trace\n is not correctly indented & ambiguous\n\n + JDK-8228835: Memory leak in PKCS11 provider when using\n AES GCM\n\n + JDK-8233621: Mismatch in jsse.enableMFLNExtension\n property name\n\n + JDK-8238898, PR3801: Missing hash characters for header\n on license file\n\n + JDK-8243320: Add SSL root certificates to Oracle Root CA\n program\n\n + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the\n latest release 1.8.26\n\n + JDK-8245467: Remove 8u TLSv1.2 implementation files\n\n + JDK-8245469: Remove DTLS protocol implementation\n\n + JDK-8245470: Fix JDK8 compatibility issues\n\n + JDK-8245471: Revert JDK-8148188\n\n + JDK-8245472: Backport JDK-8038893 to JDK8\n\n + JDK-8245473: OCSP stapling support\n\n + JDK-8245474: Add TLS_KRB5 cipher suites support\n according to RFC-2712\n\n + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello\n message by default\n\n + JDK-8245477: Adjust TLS tests location\n\n + JDK-8245653: Remove 8u TLS tests\n\n + JDK-8245681: Add TLSv1.3 regression test from 11.0.7\n\n + JDK-8251117: Cannot check P11Key size in P11Cipher and\n P11AEADCipher\n\n + JDK-8251120, PR3793: [8u] HotSpot build assumes\n ENABLE_JFR is set to either true or false\n\n + JDK-8251341: Minimal Java specification change\n\n + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u\n\n - Import of OpenJDK 8 u272 build 07\n\n + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ\n\n - Import of OpenJDK 8 u272 build 08\n\n + JDK-8062947: Fix exception message to correctly\n represent LDAP connection failure\n\n + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java\n failed due to timeout on DeadServerNoTimeoutTest is\n incorrect\n\n + JDK-8252573: 8u: Windows build failed after 8222079\n backport\n\n - Import of OpenJDK 8 u272 build 09\n\n + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :\n Compilation failed\n\n - Import of OpenJDK 8 u272 build 10\n\n + JDK-8254673: Call to JvmtiExport::post_vm_start() was\n removed by the fix for JDK-8249158\n\n + JDK-8254937: Revert JDK-8148854 for 8u272\n\n - Backports\n\n + JDK-8038723, PR3806: Openup some PrinterJob tests\n\n + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when\n JTable contains certain string\n\n + JDK-8058779, PR3805: Faster implementation of\n String.replace(CharSequence, CharSequence)\n\n + JDK-8130125, PR3806: [TEST_BUG] add @modules to the\n several client tests unaffected by the automated bulk\n update\n\n + JDK-8144015, PR3806: [PIT] failures of text layout font\n tests\n\n + JDK-8144023, PR3806: [PIT] failure of text measurements\n in\n javax/swing/text/html/parser/Parser/6836089/bug6836089.j\n ava\n\n + JDK-8144240, PR3806: [macosx][PIT] AIOOB in\n closed/javax/swing/text/GlyphPainter2/6427244/bug6427244\n .java\n\n + JDK-8145542, PR3806: The case failed automatically and\n thrown java.lang.ArrayIndexOutOfBoundsException\n exception\n\n + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception\n when displaying Devanagari text in JEditorPane\n\n + JDK-8152358, PR3800: code and comment cleanups found\n during the hunt for 8077392\n\n + JDK-8152545, PR3804: Use preprocessor instead of\n compiling a program to generate native nio constants\n\n + JDK-8152680, PR3806: Regression in\n GlyphVector.getGlyphCharIndex behaviour\n\n + JDK-8158924, PR3806: Incorrect i18n text document layout\n\n + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for\n javax/swing/text/GlyphPainter2/6427244/bug6427244.java\n\n + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/\n /GetGlyphCharIndexTest.java does not compile\n\n + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/\n /GlyphPainter2/6427244/bug6427244.java - compilation\n failed\n\n + JDK-8191512, PR3806: T2K font rasterizer code removal\n\n + JDK-8191522, PR3806: Remove Bigelow&Holmes Lucida fonts\n from JDK sources\n\n + JDK-8236512, PR3801: PKCS11 Connection closed after\n Cipher.doFinal and NoPadding\n\n + JDK-8254177, PR3809: (tz) Upgrade time-zone data to\n tzdata2020b\n\n - Bug fixes\n\n + PR3798: Fix format-overflow error on GCC 10, caused by\n passing NULL to a '%s' directive\n\n + PR3795: ECDSAUtils for XML digital signatures should\n support the same curve set as the rest of the JDK\n\n + PR3799: Adapt elliptic curve patches to JDK-8245468: Add\n TLSv1.3 implementation classes from 11.0.7\n\n + PR3808: IcedTea does not install the JFR *.jfc files\n\n + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096\n has fixed its use with Shenandoah\n\n + PR3811: Don't attempt to install JFR files when JFR is\n disabled\n\n - Shenandoah\n\n + [backport] 8221435: Shenandoah should not mark through\n weak roots\n\n + [backport] 8221629: Shenandoah: Cleanup class unloading\n logic\n\n + [backport] 8222992: Shenandoah: Pre-evacuate all roots\n\n + [backport] 8223215: Shenandoah: Support verifying subset\n of roots\n\n + [backport] 8223774: Shenandoah: Refactor\n ShenandoahRootProcessor and family\n\n + [backport] 8224210: Shenandoah: Refactor\n ShenandoahRootScanner to support scanning CSet codecache\n roots\n\n + [backport] 8224508: Shenandoah: Need to update thread\n roots in final mark for piggyback ref update cycle\n\n + [backport] 8224579: ResourceMark not declared in\n shenandoahRootProcessor.inline.hpp with\n\n --disable-precompiled-headers\n\n + [backport] 8224679: Shenandoah: Make\n ShenandoahParallelCodeCacheIterator noncopyable\n\n + [backport] 8224751: Shenandoah: Shenandoah Verifier\n should select proper roots according to current GC cycle\n\n + [backport] 8225014: Separate ShenandoahRootScanner\n method for object_iterate\n\n + [backport] 8225216: gc/logging/TestMetaSpaceLog.java\n doesn't work for Shenandoah\n\n + [backport] 8225573: Shenandoah: Enhance\n ShenandoahVerifier to ensure roots to-space invariant\n\n + [backport] 8225590: Shenandoah: Refactor\n ShenandoahClassLoaderDataRoots API\n\n + [backport] 8226413: Shenandoah: Separate root scanner\n for SH::object_iterate()\n\n + [backport] 8230853: Shenandoah: replace leftover\n assert(is_in(...)) with rich asserts\n\n + [backport] 8231198: Shenandoah: heap walking should\n visit all roots most of the time\n\n + [backport] 8231244: Shenandoah: all-roots heap walking\n misses some weak roots\n\n + [backport] 8237632: Shenandoah: accept NULL fwdptr to\n cooperate with JVMTI and JFR\n\n + [backport] 8239786: Shenandoah: print per-cycle\n statistics\n\n + [backport] 8239926: Shenandoah: Shenandoah needs to mark\n nmethod's metadata\n\n + [backport] 8240671: Shenandoah: refactor\n ShenandoahPhaseTimings\n\n + [backport] 8240749: Shenandoah: refactor ShenandoahUtils\n\n + [backport] 8240750: Shenandoah: remove leftover files\n and mentions of ShenandoahAllocTracker\n\n + [backport] 8240868: Shenandoah: remove CM-with-UR\n piggybacking cycles\n\n + [backport] 8240872: Shenandoah: Avoid updating new\n regions from start of evacuation\n\n + [backport] 8240873: Shenandoah: Short-cut arraycopy\n barriers\n\n + [backport] 8240915: Shenandoah: Remove unused fields in\n init mark tasks\n\n + [backport] 8240948: Shenandoah: cleanup\n not-forwarded-objects paths after JDK-8240868\n\n + [backport] 8241007: Shenandoah: remove\n ShenandoahCriticalControlThreadPriority support\n\n + [backport] 8241062: Shenandoah: rich asserts trigger\n 'empty statement' inspection\n\n + [backport] 8241081: Shenandoah: Do not modify\n update-watermark concurrently\n\n + [backport] 8241093: Shenandoah: editorial changes in\n flag descriptions\n\n + [backport] 8241139: Shenandoah: distribute mark-compact\n work exactly to minimize fragmentation\n\n + [backport] 8241142: Shenandoah: should not use parallel\n reference processing with single GC thread\n\n + [backport] 8241351: Shenandoah: fragmentation metrics\n overhaul\n\n + [backport] 8241435: Shenandoah: avoid disabling pacing\n with 'aggressive'\n\n + [backport] 8241520: Shenandoah: simplify region sequence\n numbers handling\n\n + [backport] 8241534: Shenandoah: region status should\n include update watermark\n\n + [backport] 8241574: Shenandoah: remove\n ShenandoahAssertToSpaceClosure\n\n + [backport] 8241583: Shenandoah: turn heap lock asserts\n into macros\n\n + [backport] 8241668: Shenandoah: make\n ShenandoahHeapRegion not derive from ContiguousSpace\n\n + [backport] 8241673: Shenandoah: refactor\n anti-false-sharing padding\n\n + [backport] 8241675: Shenandoah: assert(n->outcnt() > 0)\n at shenandoahSupport.cpp:2858 with\n java/util/Collections/FindSubList.java\n\n + [backport] 8241692: Shenandoah: remove\n ShenandoahHeapRegion::_reserved\n\n + [backport] 8241700: Shenandoah: Fold\n ShenandoahKeepAliveBarrier flag into\n ShenandoahSATBBarrier\n\n + [backport] 8241740: Shenandoah: remove\n ShenandoahHeapRegion::_heap\n\n + [backport] 8241743: Shenandoah: refactor and inline\n ShenandoahHeap::heap()\n\n + [backport] 8241748: Shenandoah: inline MarkingContext\n TAMS methods\n\n + [backport] 8241838: Shenandoah: no need to trash cset\n during final mark\n\n + [backport] 8241841: Shenandoah: ditch one of allocation\n type counters in ShenandoahHeapRegion\n\n + [backport] 8241842: Shenandoah: inline\n ShenandoahHeapRegion::region_number\n\n + [backport] 8241844: Shenandoah: rename\n ShenandoahHeapRegion::region_number\n\n + [backport] 8241845: Shenandoah: align\n ShenandoahHeapRegions to cache lines\n\n + [backport] 8241926: Shenandoah: only print heap changes\n for operations that directly affect it\n\n + [backport] 8241983: Shenandoah: simplify FreeSet logging\n\n + [backport] 8241985: Shenandoah: simplify collectable\n garbage logging\n\n + [backport] 8242040: Shenandoah: print allocation failure\n type\n\n + [backport] 8242041: Shenandoah: adaptive heuristics\n should account evac reserve in free target\n\n + [backport] 8242042: Shenandoah: tune down\n ShenandoahGarbageThreshold\n\n + [backport] 8242054: Shenandoah: New incremental-update\n mode\n\n + [backport] 8242075: Shenandoah: rename\n ShenandoahHeapRegionSize flag\n\n + [backport] 8242082: Shenandoah: Purge Traversal mode\n\n + [backport] 8242083: Shenandoah: split 'Prepare\n Evacuation' tracking into cset/freeset counters\n\n + [backport] 8242089: Shenandoah: per-worker stats should\n be summed up, not averaged\n\n + [backport] 8242101: Shenandoah: coalesce and parallelise\n heap region walks during the pauses\n\n + [backport] 8242114: Shenandoah: remove\n ShenandoahHeapRegion::reset_alloc_metadata_to_shared\n\n + [backport] 8242130: Shenandoah: Simplify\n arraycopy-barrier dispatching\n\n + [backport] 8242211: Shenandoah: remove\n ShenandoahHeuristics::RegionData::_seqnum_last_alloc\n\n + [backport] 8242212: Shenandoah: initialize\n ShenandoahHeuristics::_region_data eagerly\n\n + [backport] 8242213: Shenandoah: remove\n ShenandoahHeuristics::_bytes_in_cset\n\n + [backport] 8242217: Shenandoah: Enable GC mode to be\n diagnostic/experimental and have a name\n\n + [backport] 8242227: Shenandoah: transit regions to cset\n state when adding to collection set\n\n + [backport] 8242228: Shenandoah: remove unused\n ShenandoahCollectionSet methods\n\n + [backport] 8242229: Shenandoah: inline\n ShenandoahHeapRegion liveness-related methods\n\n + [backport] 8242267: Shenandoah: regions space needs to\n be aligned by os::vm_allocation_granularity()\n\n + [backport] 8242271: Shenandoah: add test to verify GC\n mode unlock\n\n + [backport] 8242273: Shenandoah: accept either SATB or IU\n barriers, but not both\n\n + [backport] 8242301: Shenandoah: Inline LRB runtime call\n\n + [backport] 8242316: Shenandoah: Turn NULL-check into\n assert in SATB slow-path entry\n\n + [backport] 8242353: Shenandoah: micro-optimize region\n liveness handling\n\n + [backport] 8242365: Shenandoah: use uint16_t instead of\n jushort for liveness cache\n\n + [backport] 8242375: Shenandoah: Remove\n ShenandoahHeuristic::record_gc_start/end methods\n\n + [backport] 8242641: Shenandoah: clear live data and\n update TAMS optimistically\n\n + [backport] 8243238: Shenandoah: explicit GC request\n should wait for a complete GC cycle\n\n + [backport] 8243301: Shenandoah: ditch\n ShenandoahAllowMixedAllocs\n\n + [backport] 8243307: Shenandoah: remove\n ShCollectionSet::live_data\n\n + [backport] 8243395: Shenandoah: demote guarantee in\n ShenandoahPhaseTimings::record_workers_end\n\n + [backport] 8243463: Shenandoah: ditch total_pause\n counters\n\n + [backport] 8243464: Shenandoah: print statistic counters\n in time order\n\n + [backport] 8243465: Shenandoah: ditch unused\n pause_other, conc_other counters\n\n + [backport] 8243487: Shenandoah: make _num_phases illegal\n phase type\n\n + [backport] 8243494: Shenandoah: set counters once per\n cycle\n\n + [backport] 8243573: Shenandoah: rename GCParPhases and\n related code\n\n + [backport] 8243848: Shenandoah: Windows build fails\n after JDK-8239786\n\n + [backport] 8244180: Shenandoah: carry Phase to\n ShWorkerTimingsTracker explicitly\n\n + [backport] 8244200: Shenandoah: build breakages after\n JDK-8241743\n\n + [backport] 8244226: Shenandoah: per-cycle statistics\n contain worker data from previous cycles\n\n + [backport] 8244326: Shenandoah: global statistics should\n not accept bogus samples\n\n + [backport] 8244509: Shenandoah: refactor\n ShenandoahBarrierC2Support::test_* methods\n\n + [backport] 8244551: Shenandoah: Fix racy update of\n update_watermark\n\n + [backport] 8244667: Shenandoah:\n SBC2Support::test_gc_state takes loop for wrong control\n\n + [backport] 8244730: Shenandoah: gc/shenandoah/options/\n /TestHeuristicsUnlock.java should only verify the\n heuristics\n\n + [backport] 8244732: Shenandoah: move heuristics code to\n gc/shenandoah/heuristics\n\n + [backport] 8244737: Shenandoah: move mode code to\n gc/shenandoah/mode\n\n + [backport] 8244739: Shenandoah: break superclass\n dependency on ShenandoahNormalMode\n\n + [backport] 8244740: Shenandoah: rename\n ShenandoahNormalMode to ShenandoahSATBMode\n\n + [backport] 8245461: Shenandoah: refine mode name()-s\n\n + [backport] 8245463: Shenandoah: refine\n ShenandoahPhaseTimings constructor arguments\n\n + [backport] 8245464: Shenandoah: allocate collection set\n bitmap at lower addresses\n\n + [backport] 8245465: Shenandoah: test_in_cset can use\n more efficient encoding\n\n + [backport] 8245726: Shenandoah: lift/cleanup\n ShenandoahHeuristics names and properties\n\n + [backport] 8245754: Shenandoah: ditch\n ShenandoahAlwaysPreTouch\n\n + [backport] 8245757: Shenandoah: AlwaysPreTouch should\n not disable heap resizing or uncommits\n\n + [backport] 8245773: Shenandoah: Windows assertion\n failure after JDK-8245464\n\n + [backport] 8245812: Shenandoah: compute root phase\n parallelism\n\n + [backport] 8245814: Shenandoah: reconsider format\n specifiers for stats\n\n + [backport] 8245825: Shenandoah: Remove diagnostic flag\n ShenandoahConcurrentScanCodeRoots\n\n + [backport] 8246162: Shenandoah: full GC does not mark\n code roots when class unloading is off\n\n + [backport] 8247310: Shenandoah: pacer should not affect\n interrupt status\n\n + [backport] 8247358: Shenandoah: reconsider free budget\n slice for marking\n\n + [backport] 8247367: Shenandoah: pacer should wait on\n lock instead of exponential backoff\n\n + [backport] 8247474: Shenandoah: Windows build warning\n after JDK-8247310\n\n + [backport] 8247560: Shenandoah: heap iteration holds\n root locks all the time\n\n + [backport] 8247593: Shenandoah: should not block pacing\n reporters\n\n + [backport] 8247751: Shenandoah: options tests should run\n with smaller heaps\n\n + [backport] 8247754: Shenandoah: mxbeans tests can be\n shorter\n\n + [backport] 8247757: Shenandoah: split heavy tests by\n heuristics to improve parallelism\n\n + [backport] 8247860: Shenandoah: add update watermark\n line in rich assert failure message\n\n + [backport] 8248041: Shenandoah: pre-Full GC root updates\n may miss some roots\n\n + [backport] 8248652: Shenandoah: SATB buffer handling may\n assume no forwarded objects\n\n + [backport] 8249560: Shenandoah: Fix racy GC request\n handling\n\n + [backport] 8249649: Shenandoah: provide per-cycle pacing\n stats\n\n + [backport] 8249801: Shenandoah: Clear soft-refs on\n requested GC cycle\n\n + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans\n tests should account for corner cases\n\n + Fix slowdebug build after JDK-8230853 backport\n\n + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for\n x86_32 and JFR\n\n + JDK-8252366: Shenandoah: revert/cleanup changes in\n graphKit.cpp\n\n + Shenandoah: add JFR roots to root processor after JFR\n integration\n\n + Shenandoah: add root statistics for string dedup\n table/queues\n\n + Shenandoah: enable low-frequency STW class unloading\n\n + Shenandoah: fix build failures after JDK-8244737\n backport\n\n + Shenandoah: Fix build failure with +JFR -PCH\n\n + Shenandoah: fix forceful pacer claim\n\n + Shenandoah: fix formats in\n ShenandoahStringSymbolTableUnlinkTask\n\n + Shenandoah: fix runtime linking failure due to\n non-compiled shenandoahBarrierSetC1\n\n + Shenandoah: hook statistics printing to PrintGCDetails,\n not PrintGC\n\n + Shenandoah: JNI weak roots are always cleared before\n Full GC mark\n\n + Shenandoah: missing SystemDictionary roots in\n ShenandoahHeapIterationRootScanner\n\n + Shenandoah: move barrier sets to their proper locations\n\n + Shenandoah: move parallelCleaning.* to shenandoah/\n\n + Shenandoah: pacer should use proper Atomics for intptr_t\n\n + Shenandoah: properly deallocates class loader metadata\n\n + Shenandoah: specialize String Table scans for better\n pause performance\n\n + Shenandoah: Zero build fails after recent Atomic cleanup\n in Pacer\n\n - AArch64 port\n\n + JDK-8161072, PR3797: AArch64: jtreg\n compiler/uncommontrap/TestDeoptOOM failure\n\n + JDK-8171537, PR3797: aarch64:\n compiler/c1/Test6849574.java generates guarantee failure\n in C1\n\n + JDK-8183925, PR3797: [AArch64] Decouple crash protection\n from watcher thread\n\n + JDK-8199712, PR3797: [AArch64] Flight Recorder\n\n + JDK-8203481, PR3797: Incorrect constraint for\n unextended_sp in frame:safe_for_sender\n\n + JDK-8203699, PR3797:\n java/lang/invoke/SpecialInterfaceCall fails with SIGILL\n on aarch64\n\n + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack\n command\n\n + JDK-8215961, PR3797:\n jdk/jfr/event/os/TestCPUInformation.java fails on\n AArch64\n\n + JDK-8216989, PR3797:\n CardTableBarrierSetAssembler::gen_write_ref_array_post_b\n arrier() does not check for zero length on AARCH64\n\n + JDK-8217368, PR3797: AArch64: C2 recursive stack locking\n optimisation not triggered\n\n + JDK-8221658, PR3797: aarch64: add necessary predicate\n for ubfx patterns\n\n + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a\n BufferBlob\n\n + JDK-8246482, PR3797: Build failures with +JFR -PCH\n\n + JDK-8247979, PR3797: aarch64: missing side effect of\n killing flags for clearArray_reg_reg\n\n + JDK-8248219, PR3797: aarch64: missing memory barrier in\n fast_storefield and fast_accessfield\n\nIgnore whitespaces after the header or footer in PEM X.509 cert\n(bsc#1171352)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171352\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174157\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1177943\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14556/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14577/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14578/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14579/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14581/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14583/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14593/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14621/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14779/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14781/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14782/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14792/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14796/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14797/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14798/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14803/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20203191-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?233ea856\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud Crowbar 9 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2020-3191=1\n\nSUSE OpenStack Cloud Crowbar 8 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2020-3191=1\n\nSUSE OpenStack Cloud 9 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-9-2020-3191=1\n\nSUSE OpenStack Cloud 8 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-8-2020-3191=1\n\nSUSE OpenStack Cloud 7 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-7-2020-3191=1\n\nSUSE Linux Enterprise Server for SAP 12-SP4 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP4-2020-3191=1\n\nSUSE Linux Enterprise Server for SAP 12-SP3 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP3-2020-3191=1\n\nSUSE Linux Enterprise Server for SAP 12-SP2 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP2-2020-3191=1\n\nSUSE Linux Enterprise Server 12-SP5 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-3191=1\n\nSUSE Linux Enterprise Server 12-SP4-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2020-3191=1\n\nSUSE Linux Enterprise Server 12-SP3-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-3191=1\n\nSUSE Linux Enterprise Server 12-SP3-BCL :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2020-3191=1\n\nSUSE Linux Enterprise Server 12-SP2-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP2-2020-3191=1\n\nSUSE Linux Enterprise Server 12-SP2-BCL :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2020-3191=1\n\nSUSE Enterprise Storage 5 :\n\nzypper in -t patch SUSE-Storage-5-2020-3191=1\n\nHPE Helion Openstack 8 :\n\nzypper in -t patch HPE-Helion-OpenStack-8-2020-3191=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14792\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-demo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-demo-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-headless\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-1_8_0-openjdk-headless-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/07/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(2|3|4|5)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP2/3/4/5\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"java-1_8_0-openjdk-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"java-1_8_0-openjdk-debuginfo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"java-1_8_0-openjdk-debugsource-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"java-1_8_0-openjdk-demo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"java-1_8_0-openjdk-demo-debuginfo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"java-1_8_0-openjdk-devel-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"java-1_8_0-openjdk-devel-debuginfo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"java-1_8_0-openjdk-headless-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"java-1_8_0-openjdk-headless-debuginfo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"java-1_8_0-openjdk-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"java-1_8_0-openjdk-debuginfo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"java-1_8_0-openjdk-debugsource-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"java-1_8_0-openjdk-demo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"java-1_8_0-openjdk-demo-debuginfo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"java-1_8_0-openjdk-devel-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"java-1_8_0-openjdk-devel-debuginfo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"java-1_8_0-openjdk-headless-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"java-1_8_0-openjdk-headless-debuginfo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"java-1_8_0-openjdk-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"java-1_8_0-openjdk-debuginfo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"java-1_8_0-openjdk-debugsource-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"java-1_8_0-openjdk-demo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"java-1_8_0-openjdk-demo-debuginfo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"java-1_8_0-openjdk-devel-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"java-1_8_0-openjdk-devel-debuginfo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"java-1_8_0-openjdk-headless-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"java-1_8_0-openjdk-headless-debuginfo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-1_8_0-openjdk-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-1_8_0-openjdk-debuginfo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-1_8_0-openjdk-debugsource-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-1_8_0-openjdk-demo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-1_8_0-openjdk-demo-debuginfo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-1_8_0-openjdk-devel-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-1_8_0-openjdk-devel-debuginfo-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-1_8_0-openjdk-headless-1.8.0.272-27.48.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-1_8_0-openjdk-headless-debuginfo-1.8.0.272-27.48.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-1_8_0-openjdk\");\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2020-12-12T14:48:41", "description": "This update for java-11-openjdk fixes the following issues :\n\nUpdate to upstream tag jdk-11.0.9-11 (October 2020 CPU, bsc#1177943)\n\n - New features\n\n + JDK-8250784: Shenandoah: A Low-Pause-Time Garbage\n Collector\n\n - Security fixes\n\n + JDK-8233624: Enhance JNI linkage\n\n + JDK-8236196: Improve string pooling\n\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy\n class\n\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n\n + JDK-8237995, CVE-2020-14782: Enhance certificate\n processing\n\n + JDK-8240124: Better VM Interning\n\n + JDK-8241114, CVE-2020-14792: Better range handling\n\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n\n + JDK-8243302: Advanced class supports\n\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n\n + JDK-8244479: Further constrain certificates\n\n + JDK-8244955: Additional Fix for JDK-8240124\n\n + JDK-8245407: Enhance zoning of times\n\n + JDK-8245412: Better class definitions\n\n + JDK-8245417: Improve certificate chain handling\n\n + JDK-8248574: Improve jpeg processing\n\n + JDK-8249927: Specify limits of\n jdk.serialProxyInterfaceLimit\n\n + JDK-8253019: Enhanced JPEG decoding\n\n - Other changes\n\n + JDK-6532025: GIF reader throws misleading exception with\n truncated images\n\n + JDK-6949753: [TEST BUG]: java/awt/print/PageFormat/\n /PDialogTest.java needs update by removing an infinite\n loop\n\n + JDK-8022535: [TEST BUG] javax/swing/text/html/parser/\n /Test8017492.java fails\n\n + JDK-8062947: Fix exception message to correctly\n represent LDAP connection failure\n\n + JDK-8067354: com/sun/jdi/GetLocalVariables4Test.sh\n failed\n\n + JDK-8134599: TEST_BUG:\n java/rmi/transport/closeServerSocket/\n /CloseServerSocket.java fails intermittently with\n Address already in use\n\n + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java\n failed due to timeout on DeadServerNoTimeoutTest is\n incorrect\n\n + JDK-8160768: Add capability to custom resolve\n host/domain names within the default JNDI LDAP provider\n\n + JDK-8172404: Tools should warn if weak algorithms are\n used before restricting them\n\n + JDK-8193367: Annotated type variable bounds crash javac\n\n + JDK-8202117:\n com/sun/jndi/ldap/RemoveNamingListenerTest.java fails\n intermittently: Connection reset\n\n + JDK-8203026: java.rmi.NoSuchObjectException: no such\n object in table\n\n + JDK-8203281: [Windows] JComboBox change in ui when\n editor.setBorder() is called\n\n + JDK-8203382: Rename\n SystemDictionary::initialize_wk_klass to\n resolve_wk_klass\n\n + JDK-8203393: com/sun/jdi/JdbMethodExitTest.sh and\n JdbExprTest.sh fail due to timeout\n\n + JDK-8203928: [Test] Convert non-JDB scaffolding\n serviceability shell script tests to java\n\n + JDK-8204963: javax.swing.border.TitledBorder has a\n memory leak\n\n + JDK-8204994: SA might fail to attach to process with\n ", "edition": 2, "cvss3": {"score": 4.2, "vector": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}, "published": "2020-12-09T00:00:00", "title": "SUSE SLES12 Security Update : java-11-openjdk (SUSE-SU-2020:3159-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-14803", "CVE-2020-14782", "CVE-2020-14792", "CVE-2020-14781", "CVE-2020-14798", "CVE-2020-14779", "CVE-2020-14797", "CVE-2020-14796"], "modified": "2020-12-09T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:java-11-openjdk-demo", "cpe:/o:novell:suse_linux:12", "p-cpe:/a:novell:suse_linux:java-11-openjdk-debugsource", "p-cpe:/a:novell:suse_linux:java-11-openjdk", "p-cpe:/a:novell:suse_linux:java-11-openjdk-debuginfo", "p-cpe:/a:novell:suse_linux:java-11-openjdk-devel", "p-cpe:/a:novell:suse_linux:java-11-openjdk-headless"], "id": "SUSE_SU-2020-3159-1.NASL", "href": "https://www.tenable.com/plugins/nessus/143791", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:3159-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(143791);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/12/11\");\n\n script_cve_id(\"CVE-2020-14779\", \"CVE-2020-14781\", \"CVE-2020-14782\", \"CVE-2020-14792\", \"CVE-2020-14796\", \"CVE-2020-14797\", \"CVE-2020-14798\", \"CVE-2020-14803\");\n\n script_name(english:\"SUSE SLES12 Security Update : java-11-openjdk (SUSE-SU-2020:3159-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for java-11-openjdk fixes the following issues :\n\nUpdate to upstream tag jdk-11.0.9-11 (October 2020 CPU, bsc#1177943)\n\n - New features\n\n + JDK-8250784: Shenandoah: A Low-Pause-Time Garbage\n Collector\n\n - Security fixes\n\n + JDK-8233624: Enhance JNI linkage\n\n + JDK-8236196: Improve string pooling\n\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy\n class\n\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n\n + JDK-8237995, CVE-2020-14782: Enhance certificate\n processing\n\n + JDK-8240124: Better VM Interning\n\n + JDK-8241114, CVE-2020-14792: Better range handling\n\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n\n + JDK-8243302: Advanced class supports\n\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n\n + JDK-8244479: Further constrain certificates\n\n + JDK-8244955: Additional Fix for JDK-8240124\n\n + JDK-8245407: Enhance zoning of times\n\n + JDK-8245412: Better class definitions\n\n + JDK-8245417: Improve certificate chain handling\n\n + JDK-8248574: Improve jpeg processing\n\n + JDK-8249927: Specify limits of\n jdk.serialProxyInterfaceLimit\n\n + JDK-8253019: Enhanced JPEG decoding\n\n - Other changes\n\n + JDK-6532025: GIF reader throws misleading exception with\n truncated images\n\n + JDK-6949753: [TEST BUG]: java/awt/print/PageFormat/\n /PDialogTest.java needs update by removing an infinite\n loop\n\n + JDK-8022535: [TEST BUG] javax/swing/text/html/parser/\n /Test8017492.java fails\n\n + JDK-8062947: Fix exception message to correctly\n represent LDAP connection failure\n\n + JDK-8067354: com/sun/jdi/GetLocalVariables4Test.sh\n failed\n\n + JDK-8134599: TEST_BUG:\n java/rmi/transport/closeServerSocket/\n /CloseServerSocket.java fails intermittently with\n Address already in use\n\n + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java\n failed due to timeout on DeadServerNoTimeoutTest is\n incorrect\n\n + JDK-8160768: Add capability to custom resolve\n host/domain names within the default JNDI LDAP provider\n\n + JDK-8172404: Tools should warn if weak algorithms are\n used before restricting them\n\n + JDK-8193367: Annotated type variable bounds crash javac\n\n + JDK-8202117:\n com/sun/jndi/ldap/RemoveNamingListenerTest.java fails\n intermittently: Connection reset\n\n + JDK-8203026: java.rmi.NoSuchObjectException: no such\n object in table\n\n + JDK-8203281: [Windows] JComboBox change in ui when\n editor.setBorder() is called\n\n + JDK-8203382: Rename\n SystemDictionary::initialize_wk_klass to\n resolve_wk_klass\n\n + JDK-8203393: com/sun/jdi/JdbMethodExitTest.sh and\n JdbExprTest.sh fail due to timeout\n\n + JDK-8203928: [Test] Convert non-JDB scaffolding\n serviceability shell script tests to java\n\n + JDK-8204963: javax.swing.border.TitledBorder has a\n memory leak\n\n + JDK-8204994: SA might fail to attach to process with\n 'Windbg Error: WaitForEvent failed'\n\n + JDK-8205534: Remove SymbolTable dependency from\n serviceability agent\n\n + JDK-8206309: Tier1 SA tests fail\n\n + JDK-8208281: java/nio/channels/\n /AsynchronousSocketChannel/Basic.java timed out\n\n + JDK-8209109: [TEST] rewrite com/sun/jdi shell tests to\n java version\n\n - step1\n\n + JDK-8209332: [TEST]\n test/jdk/com/sun/jdi/CatchPatternTest.sh is incorrect\n\n + JDK-8209342: Problemlist SA tests on Solaris due to\n Error attaching to process: Can't create thread_db\n agent!\n\n + JDK-8209343: Test\n javax/swing/border/TestTitledBorderLeak.java should be\n marked as headful\n\n + JDK-8209517: com/sun/jdi/BreakpointWithFullGC.java fails\n with timeout\n\n + JDK-8209604: [TEST] rewrite com/sun/jdi shell tests to\n java version\n\n - step2\n\n + JDK-8209605: com/sun/jdi/BreakpointWithFullGC.java fails\n with ZGC\n\n + JDK-8209608: Problem list\n com/sun/jdi/BreakpointWithFullGC.java\n\n + JDK-8210131:\n vmTestbase/nsk/jvmti/scenarios/allocation/AP10/\n /ap10t001/TestDescription.java failed with ObjectFree:\n GetCurrentThreadCpuTimerInfo returned unexpected error\n code\n\n + JDK-8210243: [TEST] rewrite com/sun/jdi shell tests to\n java version\n\n - step3\n\n + JDK-8210527: JShell: NullPointerException in\n jdk.jshell.Eval.translateExceptionStack\n\n + JDK-8210560: [TEST] convert com/sun/jdi\n redefineClass-related tests\n\n + JDK-8210725: com/sun/jdi/RedefineClearBreakpoint.java\n fails with waitForPrompt timed out after 60 seconds\n\n + JDK-8210748: [TESTBUG] lib.jdb.Jdb.waitForPrompt()\n should clarify which output is the pending reply after a\n timeout\n\n + JDK-8210760: [TEST] rewrite com/sun/jdi shell tests to\n java version\n\n - step4\n\n + JDK-8210977:\n jdk/jfr/event/oldobject/TestThreadLocalLeak.java fails\n to find ThreadLocalObject\n\n + JDK-8211292: [TEST] convert\n com/sun/jdi/DeferredStepTest.sh test\n\n + JDK-8211694: JShell: Redeclared variable should be reset\n\n + JDK-8212200: assert when shared java.lang.Object is\n redefined by JVMTI agent\n\n + JDK-8212629: [TEST] wrong breakpoint in\n test/jdk/com/sun/jdi/DeferredStepTest\n\n + JDK-8212665: com/sun/jdi/DeferredStepTest.java: jj1\n (line 57)\n\n - unexpected. lastLine=52, minLine=52, maxLine=55\n\n + JDK-8212807: tools/jar/multiRelease/Basic.java times out\n\n + JDK-8213182: Minimal VM build failure after JDK-8212200\n (assert when shared java.lang.Object is redefined by\n JVMTI agent)\n\n + JDK-8213214: Set -Djava.io.tmpdir= when running tests\n\n + JDK-8213275: ReplaceCriticalClasses.java fails with\n jdk.internal.vm.PostVMInitHook not found\n\n + JDK-8213574: Deadlock in string table expansion when\n dumping lots of CDS classes\n\n + JDK-8213703: LambdaConversionException: Invalid receiver\n type not a subtype of implementation type interface\n\n + JDK-8214074: Ghash optimization using AVX instructions\n\n + JDK-8214491: Upgrade to JLine 3.9.0\n\n + JDK-8214797: TestJmapCoreMetaspace.java timed out\n\n + JDK-8215243: JShell tests failing intermitently with\n 'Problem cleaning up the following threads:'\n\n + JDK-8215244: jdk/jshell/ToolBasicTest.java\n testHistoryReference failed\n\n + JDK-8215354: x86_32 build failures after JDK-8214074\n (Ghash optimization using AVX instructions)\n\n + JDK-8215438: jshell tool: Ctrl-D causes EOF\n\n + JDK-8216021: RunTest.gmk might set concurrency level to\n 1 on Windows\n\n + JDK-8216974: HttpConnection not returned to the pool\n after 204 response\n\n + JDK-8218948: SimpleDateFormat :: format - Zone Names are\n not reflected correctly during run time\n\n + JDK-8219712: code_size2 (defined in\n stub_routines_x86.hpp) is too small on new Skylake CPUs\n\n + JDK-8220150: macos10.14 Mojave returns anti-aliased\n glyphs instead of aliased B&W glyphs\n\n + JDK-8221658: aarch64: add necessary predicate for ubfx\n patterns\n\n + JDK-8221759: Crash when completing 'java.io.File.path'\n\n + JDK-8221918: runtime/SharedArchiveFile/serviceability/\n /ReplaceCriticalClasses.java fails: Shared archive not\n found\n\n + JDK-8222074: Enhance auto vectorization for x86\n\n + JDK-8222079: Don't use memset to initialize fields\n decode_env constructor in disassembler.cpp\n\n + JDK-8222769: [TESTBUG] TestJFRNetworkEvents should not\n rely on hostname command\n\n + JDK-8223688: JShell: crash on the instantiation of raw\n anonymous class\n\n + JDK-8223777: In posix_spawn mode, failing to exec()\n jspawnhelper does not result in an error\n\n + JDK-8223940: Private key not supported by chosen\n signature algorithm\n\n + JDK-8224184: jshell got IOException at exiting with AIX\n\n + JDK-8224234: compiler/codegen/TestCharVect2.java fails\n in test_mulc\n\n + JDK-8225037: java.net.JarURLConnection::getJarEntry()\n throws NullPointerException\n\n + JDK-8225625: AES Electronic Codebook (ECB) encryption\n and decryption optimization using AVX512 + VAES\n instructions\n\n + JDK-8226536: Catch OOM from deopt that fails\n rematerializing objects\n\n + JDK-8226575: OperatingSystemMXBean should be made\n container aware\n\n + JDK-8226697: Several tests which need the @key headful\n keyword are missing it.\n\n + JDK-8226809: Circular reference in printed stack trace\n is not correctly indented & ambiguous\n\n + JDK-8227059: sun/security/tools/keytool/\n /DefaultSignatureAlgorithm.java timed out\n\n + JDK-8227269: Slow class loading when running with JDWP\n\n + JDK-8227595:\n keytool/fakegen/DefaultSignatureAlgorithm.java fails due\n to 'exitValue = 6'\n\n + JDK-8228448: Jconsole can't connect to itself\n\n + JDK-8228967: Trust/Key store and SSL context utilities\n for tests\n\n + JDK-8229378: jdwp library loader in linker_md.c quietly\n truncates on buffer overflow\n\n + JDK-8229815: Upgrade Jline to 3.12.1\n\n + JDK-8230000: some httpclients testng tests run zero test\n\n + JDK-8230002: javax/xml/jaxp/unittest/transform/\n /SecureProcessingTest.java runs zero test\n\n + JDK-8230010: Remove jdk8037819/BasicTest1.java\n\n + JDK-8230094: CCE in createXMLEventWriter(Result) over an\n arbitrary XMLStreamWriter\n\n + JDK-8230402: Allocation of compile task fails with\n assert: 'Leaking compilation tasks?'\n\n + JDK-8230767: FlightRecorderListener returns null\n recording\n\n + JDK-8230870: (zipfs) Add a ZIP FS test that is similar\n to test/jdk/java/util/zip/EntryCount64k.java\n\n + JDK-8231209: [REDO]\n ThreadMXBean::getThreadAllocatedBytes() can be quicker\n for self thread\n\n + JDK-8231586: enlarge encoding space for OopMapValue\n offsets\n\n + JDK-8231953: Wrong assumption in assertion in\n oop::register_oop\n\n + JDK-8231968: getCurrentThreadAllocatedBytes default\n implementation s/b getThreadAllocatedBytes\n\n + JDK-8232083: Minimal VM is broken after JDK-8231586\n\n + JDK-8232161: Align some one-way conversion in MS950\n charset with Windows\n\n + JDK-8232855: jshell missing word in /help help\n\n + JDK-8233027: OopMapSet::all_do does oms.next() twice\n during iteration\n\n + JDK-8233228: Disable weak named curves by default in\n TLS, CertPath, and Signed JAR\n\n + JDK-8233386: Initialize NULL fields for unused\n decorations\n\n + JDK-8233452: java.math.BigDecimal.sqrt() with\n RoundingMode.FLOOR results in incorrect result\n\n + JDK-8233686: XML transformer uses excessive amount of\n memory\n\n + JDK-8233741: AES Countermode (AES-CTR) optimization\n using AVX512 + VAES instructions\n\n + JDK-8233829: javac cannot find non-ASCII module name\n under non-UTF8 environment\n\n + JDK-8233958: Memory retention due to HttpsURLConnection\n finalizer that serves no purpose\n\n + JDK-8234011: (zipfs) Memory leak in\n ZipFileSystem.releaseDeflater()\n\n + JDK-8234058: runtime/CompressedOops/\n /CompressedClassPointers.java fails with 'Narrow klass\n base: 0x0000000000000000' missing from stdout/stderr\n\n + JDK-8234149: Several regression tests do not dispose\n Frame at end\n\n + JDK-8234347: 'Turkey' meta time zone does not generate\n composed localized names\n\n + JDK-8234385: [TESTBUG] java/awt/EventQueue/6980209/\n /bug6980209.java fails in linux nightly\n\n + JDK-8234535: Cross compilation fails due to missing\n CFLAGS for the BUILD_CC\n\n + JDK-8234541: C1 emits an empty message when it inlines\n successfully\n\n + JDK-8234687: change javap reporting on unknown\n attributes\n\n + JDK-8236464: SO_LINGER option is ignored by SSLSocket in\n JDK 11\n\n + JDK-8236548: Localized time zone name inconsistency\n between English and other locales\n\n + JDK-8236617: jtreg test containers/docker/\n /TestMemoryAwareness.java fails after 8226575\n\n + JDK-8237182: Update copyright header for shenandoah and\n epsilon files\n\n + JDK-8237888: security/infra/java/security/cert/\n /CertPathValidator/certification/LuxTrustCA.java fails\n when checking validity interval\n\n + JDK-8237977: Further update\n javax/net/ssl/compatibility/Compatibility.java\n\n + JDK-8238270: java.net HTTP/2 client does not decrease\n stream count when receives 204 response\n\n + JDK-8238284: [macos] Zero VM build fails due to an\n obvious typo\n\n + JDK-8238380: java.base/unix/native/libjava/childproc.c\n 'multiple definition' link errors with GCC10\n\n + JDK-8238386: (sctp)\n jdk.sctp/unix/native/libsctp/SctpNet.c 'multiple\n definition' link errors with GCC10\n\n + JDK-8238388: libj2gss/NativeFunc.o 'multiple definition'\n link errors with GCC10\n\n + JDK-8238448: RSASSA-PSS signature verification fail when\n using certain odd key sizes\n\n + JDK-8238710: LingeredApp doesn't log stdout/stderr if\n exits with non-zero code\n\n + JDK-8239083: C1 assert(known_holder == NULL ||\n (known_holder->is_instance_klass() &&\n (!known_holder->is_interface() ||\n\n((ciInstanceKlass*)known_holder)->has_nonstatic_concrete_methods())),\n'shou ld be non-static concrete method');\n\n + JDK-8239385: KerberosTicket client name refers wrongly\n to sAMAccountName in AD\n\n + JDK-8240169: javadoc fails to link to non-modular api\n docs\n\n + JDK-8240295: hs_err elapsed time in seconds is not\n accurate enough\n\n + JDK-8240360: NativeLibraryEvent has wrong library name\n on Linux\n\n + JDK-8240676: Meet not symmetric failure when running\n lucene on jdk8\n\n + JDK-8241007: Shenandoah: remove\n ShenandoahCriticalControlThreadPriority support\n\n + JDK-8241065: Shenandoah: remove leftover code after\n JDK-8231086\n\n + JDK-8241086: Test runtime/NMT/HugeArenaTracking.java is\n failing on 32bit Windows\n\n + JDK-8241130:\n com.sun.jndi.ldap.EventSupport.removeDeadNotifier:\n java.lang.NullPointerException\n\n + JDK-8241138: http.nonProxyHosts=* causes\n StringIndexOutOfBoundsException in DefaultProxySelector\n\n + JDK-8241319: WB_GetCodeBlob doesn't have ResourceMark\n\n + JDK-8241478:\n vmTestbase/gc/gctests/Steal/steal001/steal001.java fails\n with OOME\n\n + JDK-8241574: Shenandoah: remove\n ShenandoahAssertToSpaceClosure\n\n + JDK-8241750: x86_32 build failure after JDK-8227269\n\n + JDK-8242184: CRL generation error with RSASSA-PSS\n\n + JDK-8242283: Can't start JVM when java home path\n includes non-ASCII character\n\n + JDK-8242556: Cannot load RSASSA-PSS public key with\n non-null params from byte array\n\n + JDK-8243029: Rewrite javax/net/ssl/compatibility/\n /Compatibility.java with a flexible interop test\n framework\n\n + JDK-8243138: Enhance BaseLdapServer to support starttls\n extended request\n\n + JDK-8243320: Add SSL root certificates to Oracle Root CA\n program\n\n + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA\n program\n\n + JDK-8243389: enhance os::pd_print_cpu_info on linux\n\n + JDK-8243453: java --describe-module failed with\n non-ASCII module name under non-UTF8 environment\n\n + JDK-8243470: [macos] bring back O2 opt level for\n unsafe.cpp\n\n + JDK-8243489: Thread CPU Load event may contain wrong\n data for CPU time under certain conditions\n\n + JDK-8243925: Toolkit#getScreenInsets() returns wrong\n value on HiDPI screens (Windows)\n\n + JDK-8244087: 2020-04-24 public suffix list update\n\n + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the\n latest release 1.8.26\n\n + JDK-8244164: AArch64: jaotc generates incorrect code for\n compressed OOPs with non-zero heap base\n\n + JDK-8244196: adjust output in os_linux\n\n + JDK-8244225: stringop-overflow warning on strncpy call\n from compile_the_world_in\n\n + JDK-8244287: JFR: Methods samples have line number 0\n\n + JDK-8244703: 'platform encoding not initialized'\n exceptions with debugger, JNI\n\n + JDK-8244719: CTW: C2 compilation fails with\n 'assert(!VerifyHashTableKeys || _hash_lock == 0) failed:\n remove node from hash table before modifying it'\n\n + JDK-8244729: Shenandoah: remove resolve paths from\n SBSA::generate_shenandoah_lrb\n\n + JDK-8244763: Update --release 8 symbol information after\n JSR 337 MR3\n\n + JDK-8244818: Java2D Queue Flusher crash while moving\n application window to external monitor\n\n + JDK-8245151: jarsigner should not raise duplicate\n warnings on verification\n\n + JDK-8245616: Bump update version for OpenJDK: jdk-11.0.9\n\n + JDK-8245714: 'Bad graph detected in build_loop_late'\n when loads are pinned on loop limit check uncommon\n branch\n\n + JDK-8245801: StressRecompilation triggers assert\n 'redundunt OSR recompilation detected. memory leak in\n CodeCache!'\n\n + JDK-8245832: JDK build make-static-libs should build all\n JDK libraries\n\n + JDK-8245880: Shenandoah: check class unloading flag\n early in concurrent code root scan\n\n + JDK-8245981: Upgrade to jQuery 3.5.1\n\n + JDK-8246027: Minimal fastdebug build broken after\n JDK-8245801\n\n + JDK-8246094: [macos] Sound Recording and playback is not\n working\n\n + JDK-8246153: TestEliminateArrayCopy fails with\n\n -XX:+StressReflectiveCode\n\n + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ\n\n + JDK-8246196:\n javax/management/MBeanServer/OldMBeanServerTest fails\n with AssertionError\n\n + JDK-8246203: Segmentation fault in verification due to\n stack overflow with -XX:+VerifyIterativeGVN\n\n + JDK-8246330: Add TLS Tests for Legacy ECDSA curves\n\n + JDK-8246453: TestClone crashes with 'all collected\n exceptions must come from the same place'\n\n + JDK-8247246: Add explicit ResolvedJavaType.link and\n expose presence of default methods\n\n + JDK-8247350: [aarch64] assert(false) failed: wrong size\n of mach node\n\n + JDK-8247502: PhaseStringOpts crashes while optimising\n effectively dead code\n\n + JDK-8247615: Initialize the bytes left for the heap\n sampler\n\n + JDK-8247824: CTW: C2 (Shenandoah) compilation fails with\n SEGV in SBC2Support::pin_and_expand\n\n + JDK-8247874: Replacement in VersionProps.java.template\n not working when --with-vendor-bug-url contains '&'\n\n + JDK-8247979: aarch64: missing side effect of killing\n flags for clearArray_reg_reg\n\n + JDK-8248214: Add paddings for TaskQueueSuper to reduce\n false-sharing cache contention\n\n + JDK-8248219: aarch64: missing memory barrier in\n fast_storefield and fast_accessfield\n\n + JDK-8248348: Regression caused by the update to BCEL 6.0\n\n + JDK-8248385: [testbug][11u] Adapt TestInitiExceptions to\n jtreg 5.1\n\n + JDK-8248495: [macos] zerovm is broken due to libffi\n headers location\n\n + JDK-8248851: CMS: Missing memory fences between free\n chunk check and klass read\n\n + JDK-8248987: AOT's Linker.java seems to eagerly\n fail-fast on Windows\n\n + JDK-8249159: Downport test rework for SSLSocketTemplate\n from 8224650\n\n + JDK-8249215: JFrame::setVisible crashed with\n\n -Dfile.encoding=UTF-8 on Japanese Windows.\n\n + JDK-8249251: [dark_mode ubuntu 20.04] The selected menu\n is not highlighted in GTKLookAndFeel\n\n + JDK-8249255: Build fails if source code in cygwin home\n dir\n\n + JDK-8249277: TestVerifyIterativeGVN.java is failing with\n timeout in OpenJDK 11\n\n + JDK-8249278: Revert JDK-8226253 which breaks the spec of\n AccessibleState.SHOWING for JList\n\n + JDK-8249560: Shenandoah: Fix racy GC request handling\n\n + JDK-8249801: Shenandoah: Clear soft-refs on requested GC\n cycle\n\n + JDK-8249953: Shenandoah: gc/shenandoah/mxbeans tests\n should account for corner cases\n\n + JDK-8250582: Revert Principal Name type to NT-UNKNOWN\n when requesting TGS Kerberos tickets\n\n + JDK-8250609: C2 crash in IfNode::fold_compares\n\n + JDK-8250627: Use -XX:+/-UseContainerSupport for\n enabling/disabling Java container metrics\n\n + JDK-8250755: Better cleanup for\n jdk/test/javax/imageio/plugins/shared/CanWriteSequence.j\n ava\n\n + JDK-8250787: Provider.put no longer registering aliases\n in FIPS env\n\n + JDK-8250826: jhsdb does not work with coredump which\n comes from Substrate VM\n\n + JDK-8250827: Shenandoah: needs to reset/finish\n StringTable's dead count before/after parallel walk\n\n + JDK-8250844: Make sure {type,obj}ArrayOopDesc accessors\n check the bounds\n\n + JDK-8251117: Cannot check P11Key size in P11Cipher and\n P11AEADCipher\n\n + JDK-8251354: Shenandoah: Fix\n jdk/jfr/tool/TestPrintJSON.java test failure\n\n + JDK-8251451: Shenandoah: Remark ObjectSynchronizer roots\n with I-U\n\n + JDK-8251469: Better cleanup for\n test/jdk/javax/imageio/SetOutput.java\n\n + JDK-8251487: Shenandoah: missing detail timing tracking\n for final mark cleaning phase\n\n + JDK-8252120: compiler/oracle/TestCompileCommand.java\n misspells 'occured'\n\n + JDK-8252157: JDK-8231209 11u backport breaks jmm binary\n compatibility\n\n + JDK-8252258: [11u] JDK-8242154 changes the default\n vendor\n\n + JDK-8252804: [test] Fix 'ReleaseDeflater.java' test\n after downport of 8234011\n\n + JDK-8253134: JMM_VERSION should remain at 0x20020000\n (JDK 10) in JDK 11\n\n + JDK-8253283: [11u] Test build/translations/\n /VerifyTranslations.java failing after JDK-8252258\n\n + JDK-8253813: Backout JDK-8244287 from 11u: it causes\n several crashes\n\n + Fix regression '8250861: Crash in\n MinINode::Ideal(PhaseGVN*, bool)' introduced in jdk\n 11.0.9\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1177943\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14779/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14781/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14782/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14792/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14796/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14797/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14798/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14803/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20203159-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d43d3cfd\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 12-SP5 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-3159=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14792\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-11-openjdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-11-openjdk-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-11-openjdk-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-11-openjdk-demo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-11-openjdk-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-11-openjdk-headless\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/10/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(5)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP5\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-11-openjdk-11.0.9.0-3.15.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-11-openjdk-debuginfo-11.0.9.0-3.15.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-11-openjdk-debugsource-11.0.9.0-3.15.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-11-openjdk-demo-11.0.9.0-3.15.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-11-openjdk-devel-11.0.9.0-3.15.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"java-11-openjdk-headless-11.0.9.0-3.15.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-11-openjdk\");\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2020-12-12T14:48:45", "description": "This update for java-11-openjdk fixes the following issues :\n\nUpdate to upstream tag jdk-11.0.9-11 (October 2020 CPU, bsc#1177943)\n\n - New features\n\n + JDK-8250784: Shenandoah: A Low-Pause-Time Garbage\n Collector\n\n - Security fixes\n\n + JDK-8233624: Enhance JNI linkage\n\n + JDK-8236196: Improve string pooling\n\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy\n class\n\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n\n + JDK-8237995, CVE-2020-14782: Enhance certificate\n processing\n\n + JDK-8240124: Better VM Interning\n\n + JDK-8241114, CVE-2020-14792: Better range handling\n\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n\n + JDK-8243302: Advanced class supports\n\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n\n + JDK-8244479: Further constrain certificates\n\n + JDK-8244955: Additional Fix for JDK-8240124\n\n + JDK-8245407: Enhance zoning of times\n\n + JDK-8245412: Better class definitions\n\n + JDK-8245417: Improve certificate chain handling\n\n + JDK-8248574: Improve jpeg processing\n\n + JDK-8249927: Specify limits of\n jdk.serialProxyInterfaceLimit\n\n + JDK-8253019: Enhanced JPEG decoding\n\n - Other changes\n\n + JDK-6532025: GIF reader throws misleading exception with\n truncated images\n\n + JDK-6949753: [TEST BUG]: java/awt/print/PageFormat/\n /PDialogTest.java needs update by removing an infinite\n loop\n\n + JDK-8022535: [TEST BUG] javax/swing/text/html/parser/\n /Test8017492.java fails\n\n + JDK-8062947: Fix exception message to correctly\n represent LDAP connection failure\n\n + JDK-8067354: com/sun/jdi/GetLocalVariables4Test.sh\n failed\n\n + JDK-8134599: TEST_BUG:\n java/rmi/transport/closeServerSocket/\n /CloseServerSocket.java fails intermittently with\n Address already in use\n\n + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java\n failed due to timeout on DeadServerNoTimeoutTest is\n incorrect\n\n + JDK-8160768: Add capability to custom resolve\n host/domain names within the default JNDI LDAP provider\n\n + JDK-8172404: Tools should warn if weak algorithms are\n used before restricting them\n\n + JDK-8193367: Annotated type variable bounds crash javac\n\n + JDK-8202117:\n com/sun/jndi/ldap/RemoveNamingListenerTest.java fails\n intermittently: Connection reset\n\n + JDK-8203026: java.rmi.NoSuchObjectException: no such\n object in table\n\n + JDK-8203281: [Windows] JComboBox change in ui when\n editor.setBorder() is called\n\n + JDK-8203382: Rename\n SystemDictionary::initialize_wk_klass to\n resolve_wk_klass\n\n + JDK-8203393: com/sun/jdi/JdbMethodExitTest.sh and\n JdbExprTest.sh fail due to timeout\n\n + JDK-8203928: [Test] Convert non-JDB scaffolding\n serviceability shell script tests to java\n\n + JDK-8204963: javax.swing.border.TitledBorder has a\n memory leak\n\n + JDK-8204994: SA might fail to attach to process with\n ", "edition": 2, "cvss3": {"score": 4.2, "vector": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}, "published": "2020-12-09T00:00:00", "title": "SUSE SLED15 / SLES15 Security Update : java-11-openjdk (SUSE-SU-2020:3359-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-14803", "CVE-2020-14782", "CVE-2020-14792", "CVE-2020-14781", "CVE-2020-14798", "CVE-2020-14779", "CVE-2020-14797", "CVE-2020-14796"], "modified": "2020-12-09T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:java-11-openjdk-demo", "p-cpe:/a:novell:suse_linux:java-11-openjdk-debugsource", "p-cpe:/a:novell:suse_linux:java-11-openjdk", "p-cpe:/a:novell:suse_linux:java-11-openjdk-debuginfo", "cpe:/o:novell:suse_linux:15", "p-cpe:/a:novell:suse_linux:java-11-openjdk-devel", "p-cpe:/a:novell:suse_linux:java-11-openjdk-headless"], "id": "SUSE_SU-2020-3359-1.NASL", "href": "https://www.tenable.com/plugins/nessus/143712", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:3359-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(143712);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/12/11\");\n\n script_cve_id(\"CVE-2020-14779\", \"CVE-2020-14781\", \"CVE-2020-14782\", \"CVE-2020-14792\", \"CVE-2020-14796\", \"CVE-2020-14797\", \"CVE-2020-14798\", \"CVE-2020-14803\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : java-11-openjdk (SUSE-SU-2020:3359-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for java-11-openjdk fixes the following issues :\n\nUpdate to upstream tag jdk-11.0.9-11 (October 2020 CPU, bsc#1177943)\n\n - New features\n\n + JDK-8250784: Shenandoah: A Low-Pause-Time Garbage\n Collector\n\n - Security fixes\n\n + JDK-8233624: Enhance JNI linkage\n\n + JDK-8236196: Improve string pooling\n\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy\n class\n\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n\n + JDK-8237995, CVE-2020-14782: Enhance certificate\n processing\n\n + JDK-8240124: Better VM Interning\n\n + JDK-8241114, CVE-2020-14792: Better range handling\n\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n\n + JDK-8243302: Advanced class supports\n\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n\n + JDK-8244479: Further constrain certificates\n\n + JDK-8244955: Additional Fix for JDK-8240124\n\n + JDK-8245407: Enhance zoning of times\n\n + JDK-8245412: Better class definitions\n\n + JDK-8245417: Improve certificate chain handling\n\n + JDK-8248574: Improve jpeg processing\n\n + JDK-8249927: Specify limits of\n jdk.serialProxyInterfaceLimit\n\n + JDK-8253019: Enhanced JPEG decoding\n\n - Other changes\n\n + JDK-6532025: GIF reader throws misleading exception with\n truncated images\n\n + JDK-6949753: [TEST BUG]: java/awt/print/PageFormat/\n /PDialogTest.java needs update by removing an infinite\n loop\n\n + JDK-8022535: [TEST BUG] javax/swing/text/html/parser/\n /Test8017492.java fails\n\n + JDK-8062947: Fix exception message to correctly\n represent LDAP connection failure\n\n + JDK-8067354: com/sun/jdi/GetLocalVariables4Test.sh\n failed\n\n + JDK-8134599: TEST_BUG:\n java/rmi/transport/closeServerSocket/\n /CloseServerSocket.java fails intermittently with\n Address already in use\n\n + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java\n failed due to timeout on DeadServerNoTimeoutTest is\n incorrect\n\n + JDK-8160768: Add capability to custom resolve\n host/domain names within the default JNDI LDAP provider\n\n + JDK-8172404: Tools should warn if weak algorithms are\n used before restricting them\n\n + JDK-8193367: Annotated type variable bounds crash javac\n\n + JDK-8202117:\n com/sun/jndi/ldap/RemoveNamingListenerTest.java fails\n intermittently: Connection reset\n\n + JDK-8203026: java.rmi.NoSuchObjectException: no such\n object in table\n\n + JDK-8203281: [Windows] JComboBox change in ui when\n editor.setBorder() is called\n\n + JDK-8203382: Rename\n SystemDictionary::initialize_wk_klass to\n resolve_wk_klass\n\n + JDK-8203393: com/sun/jdi/JdbMethodExitTest.sh and\n JdbExprTest.sh fail due to timeout\n\n + JDK-8203928: [Test] Convert non-JDB scaffolding\n serviceability shell script tests to java\n\n + JDK-8204963: javax.swing.border.TitledBorder has a\n memory leak\n\n + JDK-8204994: SA might fail to attach to process with\n 'Windbg Error: WaitForEvent failed'\n\n + JDK-8205534: Remove SymbolTable dependency from\n serviceability agent\n\n + JDK-8206309: Tier1 SA tests fail\n\n + JDK-8208281: java/nio/channels/\n /AsynchronousSocketChannel/Basic.java timed out\n\n + JDK-8209109: [TEST] rewrite com/sun/jdi shell tests to\n java version\n\n - step1\n\n + JDK-8209332: [TEST]\n test/jdk/com/sun/jdi/CatchPatternTest.sh is incorrect\n\n + JDK-8209342: Problemlist SA tests on Solaris due to\n Error attaching to process: Can't create thread_db\n agent!\n\n + JDK-8209343: Test\n javax/swing/border/TestTitledBorderLeak.java should be\n marked as headful\n\n + JDK-8209517: com/sun/jdi/BreakpointWithFullGC.java fails\n with timeout\n\n + JDK-8209604: [TEST] rewrite com/sun/jdi shell tests to\n java version\n\n - step2\n\n + JDK-8209605: com/sun/jdi/BreakpointWithFullGC.java fails\n with ZGC\n\n + JDK-8209608: Problem list\n com/sun/jdi/BreakpointWithFullGC.java\n\n + JDK-8210131:\n vmTestbase/nsk/jvmti/scenarios/allocation/AP10/\n /ap10t001/TestDescription.java failed with ObjectFree:\n GetCurrentThreadCpuTimerInfo returned unexpected error\n code\n\n + JDK-8210243: [TEST] rewrite com/sun/jdi shell tests to\n java version\n\n - step3\n\n + JDK-8210527: JShell: NullPointerException in\n jdk.jshell.Eval.translateExceptionStack\n\n + JDK-8210560: [TEST] convert com/sun/jdi\n redefineClass-related tests\n\n + JDK-8210725: com/sun/jdi/RedefineClearBreakpoint.java\n fails with waitForPrompt timed out after 60 seconds\n\n + JDK-8210748: [TESTBUG] lib.jdb.Jdb.waitForPrompt()\n should clarify which output is the pending reply after a\n timeout\n\n + JDK-8210760: [TEST] rewrite com/sun/jdi shell tests to\n java version\n\n - step4\n\n + JDK-8210977:\n jdk/jfr/event/oldobject/TestThreadLocalLeak.java fails\n to find ThreadLocalObject\n\n + JDK-8211292: [TEST] convert\n com/sun/jdi/DeferredStepTest.sh test\n\n + JDK-8211694: JShell: Redeclared variable should be reset\n\n + JDK-8212200: assert when shared java.lang.Object is\n redefined by JVMTI agent\n\n + JDK-8212629: [TEST] wrong breakpoint in\n test/jdk/com/sun/jdi/DeferredStepTest\n\n + JDK-8212665: com/sun/jdi/DeferredStepTest.java: jj1\n (line 57)\n\n - unexpected. lastLine=52, minLine=52, maxLine=55\n\n + JDK-8212807: tools/jar/multiRelease/Basic.java times out\n\n + JDK-8213182: Minimal VM build failure after JDK-8212200\n (assert when shared java.lang.Object is redefined by\n JVMTI agent)\n\n + JDK-8213214: Set -Djava.io.tmpdir= when running tests\n\n + JDK-8213275: ReplaceCriticalClasses.java fails with\n jdk.internal.vm.PostVMInitHook not found\n\n + JDK-8213574: Deadlock in string table expansion when\n dumping lots of CDS classes\n\n + JDK-8213703: LambdaConversionException: Invalid receiver\n type not a subtype of implementation type interface\n\n + JDK-8214074: Ghash optimization using AVX instructions\n\n + JDK-8214491: Upgrade to JLine 3.9.0\n\n + JDK-8214797: TestJmapCoreMetaspace.java timed out\n\n + JDK-8215243: JShell tests failing intermitently with\n 'Problem cleaning up the following threads:'\n\n + JDK-8215244: jdk/jshell/ToolBasicTest.java\n testHistoryReference failed\n\n + JDK-8215354: x86_32 build failures after JDK-8214074\n (Ghash optimization using AVX instructions)\n\n + JDK-8215438: jshell tool: Ctrl-D causes EOF\n\n + JDK-8216021: RunTest.gmk might set concurrency level to\n 1 on Windows\n\n + JDK-8216974: HttpConnection not returned to the pool\n after 204 response\n\n + JDK-8218948: SimpleDateFormat :: format - Zone Names are\n not reflected correctly during run time\n\n + JDK-8219712: code_size2 (defined in\n stub_routines_x86.hpp) is too small on new Skylake CPUs\n\n + JDK-8220150: macos10.14 Mojave returns anti-aliased\n glyphs instead of aliased B&W glyphs\n\n + JDK-8221658: aarch64: add necessary predicate for ubfx\n patterns\n\n + JDK-8221759: Crash when completing 'java.io.File.path'\n\n + JDK-8221918: runtime/SharedArchiveFile/serviceability/\n /ReplaceCriticalClasses.java fails: Shared archive not\n found\n\n + JDK-8222074: Enhance auto vectorization for x86\n\n + JDK-8222079: Don't use memset to initialize fields\n decode_env constructor in disassembler.cpp\n\n + JDK-8222769: [TESTBUG] TestJFRNetworkEvents should not\n rely on hostname command\n\n + JDK-8223688: JShell: crash on the instantiation of raw\n anonymous class\n\n + JDK-8223777: In posix_spawn mode, failing to exec()\n jspawnhelper does not result in an error\n\n + JDK-8223940: Private key not supported by chosen\n signature algorithm\n\n + JDK-8224184: jshell got IOException at exiting with AIX\n\n + JDK-8224234: compiler/codegen/TestCharVect2.java fails\n in test_mulc\n\n + JDK-8225037: java.net.JarURLConnection::getJarEntry()\n throws NullPointerException\n\n + JDK-8225625: AES Electronic Codebook (ECB) encryption\n and decryption optimization using AVX512 + VAES\n instructions\n\n + JDK-8226536: Catch OOM from deopt that fails\n rematerializing objects\n\n + JDK-8226575: OperatingSystemMXBean should be made\n container aware\n\n + JDK-8226697: Several tests which need the @key headful\n keyword are missing it.\n\n + JDK-8226809: Circular reference in printed stack trace\n is not correctly indented & ambiguous\n\n + JDK-8227059: sun/security/tools/keytool/\n /DefaultSignatureAlgorithm.java timed out\n\n + JDK-8227269: Slow class loading when running with JDWP\n\n + JDK-8227595:\n keytool/fakegen/DefaultSignatureAlgorithm.java fails due\n to 'exitValue = 6'\n\n + JDK-8228448: Jconsole can't connect to itself\n\n + JDK-8228967: Trust/Key store and SSL context utilities\n for tests\n\n + JDK-8229378: jdwp library loader in linker_md.c quietly\n truncates on buffer overflow\n\n + JDK-8229815: Upgrade Jline to 3.12.1\n\n + JDK-8230000: some httpclients testng tests run zero test\n\n + JDK-8230002: javax/xml/jaxp/unittest/transform/\n /SecureProcessingTest.java runs zero test\n\n + JDK-8230010: Remove jdk8037819/BasicTest1.java\n\n + JDK-8230094: CCE in createXMLEventWriter(Result) over an\n arbitrary XMLStreamWriter\n\n + JDK-8230402: Allocation of compile task fails with\n assert: 'Leaking compilation tasks?'\n\n + JDK-8230767: FlightRecorderListener returns null\n recording\n\n + JDK-8230870: (zipfs) Add a ZIP FS test that is similar\n to test/jdk/java/util/zip/EntryCount64k.java\n\n + JDK-8231209: [REDO]\n ThreadMXBean::getThreadAllocatedBytes() can be quicker\n for self thread\n\n + JDK-8231586: enlarge encoding space for OopMapValue\n offsets\n\n + JDK-8231953: Wrong assumption in assertion in\n oop::register_oop\n\n + JDK-8231968: getCurrentThreadAllocatedBytes default\n implementation s/b getThreadAllocatedBytes\n\n + JDK-8232083: Minimal VM is broken after JDK-8231586\n\n + JDK-8232161: Align some one-way conversion in MS950\n charset with Windows\n\n + JDK-8232855: jshell missing word in /help help\n\n + JDK-8233027: OopMapSet::all_do does oms.next() twice\n during iteration\n\n + JDK-8233228: Disable weak named curves by default in\n TLS, CertPath, and Signed JAR\n\n + JDK-8233386: Initialize NULL fields for unused\n decorations\n\n + JDK-8233452: java.math.BigDecimal.sqrt() with\n RoundingMode.FLOOR results in incorrect result\n\n + JDK-8233686: XML transformer uses excessive amount of\n memory\n\n + JDK-8233741: AES Countermode (AES-CTR) optimization\n using AVX512 + VAES instructions\n\n + JDK-8233829: javac cannot find non-ASCII module name\n under non-UTF8 environment\n\n + JDK-8233958: Memory retention due to HttpsURLConnection\n finalizer that serves no purpose\n\n + JDK-8234011: (zipfs) Memory leak in\n ZipFileSystem.releaseDeflater()\n\n + JDK-8234058: runtime/CompressedOops/\n /CompressedClassPointers.java fails with 'Narrow klass\n base: 0x0000000000000000' missing from stdout/stderr\n\n + JDK-8234149: Several regression tests do not dispose\n Frame at end\n\n + JDK-8234347: 'Turkey' meta time zone does not generate\n composed localized names\n\n + JDK-8234385: [TESTBUG] java/awt/EventQueue/6980209/\n /bug6980209.java fails in linux nightly\n\n + JDK-8234535: Cross compilation fails due to missing\n CFLAGS for the BUILD_CC\n\n + JDK-8234541: C1 emits an empty message when it inlines\n successfully\n\n + JDK-8234687: change javap reporting on unknown\n attributes\n\n + JDK-8236464: SO_LINGER option is ignored by SSLSocket in\n JDK 11\n\n + JDK-8236548: Localized time zone name inconsistency\n between English and other locales\n\n + JDK-8236617: jtreg test containers/docker/\n /TestMemoryAwareness.java fails after 8226575\n\n + JDK-8237182: Update copyright header for shenandoah and\n epsilon files\n\n + JDK-8237888: security/infra/java/security/cert/\n /CertPathValidator/certification/LuxTrustCA.java fails\n when checking validity interval\n\n + JDK-8237977: Further update\n javax/net/ssl/compatibility/Compatibility.java\n\n + JDK-8238270: java.net HTTP/2 client does not decrease\n stream count when receives 204 response\n\n + JDK-8238284: [macos] Zero VM build fails due to an\n obvious typo\n\n + JDK-8238380: java.base/unix/native/libjava/childproc.c\n 'multiple definition' link errors with GCC10\n\n + JDK-8238386: (sctp)\n jdk.sctp/unix/native/libsctp/SctpNet.c 'multiple\n definition' link errors with GCC10\n\n + JDK-8238388: libj2gss/NativeFunc.o 'multiple definition'\n link errors with GCC10\n\n + JDK-8238448: RSASSA-PSS signature verification fail when\n using certain odd key sizes\n\n + JDK-8238710: LingeredApp doesn't log stdout/stderr if\n exits with non-zero code\n\n + JDK-8239083: C1 assert(known_holder == NULL ||\n (known_holder->is_instance_klass() &&\n (!known_holder->is_interface() ||\n\n((ciInstanceKlass*)known_holder)->has_nonstatic_concrete_methods())),\n'shou ld be non-static concrete method');\n\n + JDK-8239385: KerberosTicket client name refers wrongly\n to sAMAccountName in AD\n\n + JDK-8240169: javadoc fails to link to non-modular api\n docs\n\n + JDK-8240295: hs_err elapsed time in seconds is not\n accurate enough\n\n + JDK-8240360: NativeLibraryEvent has wrong library name\n on Linux\n\n + JDK-8240676: Meet not symmetric failure when running\n lucene on jdk8\n\n + JDK-8241007: Shenandoah: remove\n ShenandoahCriticalControlThreadPriority support\n\n + JDK-8241065: Shenandoah: remove leftover code after\n JDK-8231086\n\n + JDK-8241086: Test runtime/NMT/HugeArenaTracking.java is\n failing on 32bit Windows\n\n + JDK-8241130:\n com.sun.jndi.ldap.EventSupport.removeDeadNotifier:\n java.lang.NullPointerException\n\n + JDK-8241138: http.nonProxyHosts=* causes\n StringIndexOutOfBoundsException in DefaultProxySelector\n\n + JDK-8241319: WB_GetCodeBlob doesn't have ResourceMark\n\n + JDK-8241478:\n vmTestbase/gc/gctests/Steal/steal001/steal001.java fails\n with OOME\n\n + JDK-8241574: Shenandoah: remove\n ShenandoahAssertToSpaceClosure\n\n + JDK-8241750: x86_32 build failure after JDK-8227269\n\n + JDK-8242184: CRL generation error with RSASSA-PSS\n\n + JDK-8242283: Can't start JVM when java home path\n includes non-ASCII character\n\n + JDK-8242556: Cannot load RSASSA-PSS public key with\n non-null params from byte array\n\n + JDK-8243029: Rewrite javax/net/ssl/compatibility/\n /Compatibility.java with a flexible interop test\n framework\n\n + JDK-8243138: Enhance BaseLdapServer to support starttls\n extended request\n\n + JDK-8243320: Add SSL root certificates to Oracle Root CA\n program\n\n + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA\n program\n\n + JDK-8243389: enhance os::pd_print_cpu_info on linux\n\n + JDK-8243453: java --describe-module failed with\n non-ASCII module name under non-UTF8 environment\n\n + JDK-8243470: [macos] bring back O2 opt level for\n unsafe.cpp\n\n + JDK-8243489: Thread CPU Load event may contain wrong\n data for CPU time under certain conditions\n\n + JDK-8243925: Toolkit#getScreenInsets() returns wrong\n value on HiDPI screens (Windows)\n\n + JDK-8244087: 2020-04-24 public suffix list update\n\n + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the\n latest release 1.8.26\n\n + JDK-8244164: AArch64: jaotc generates incorrect code for\n compressed OOPs with non-zero heap base\n\n + JDK-8244196: adjust output in os_linux\n\n + JDK-8244225: stringop-overflow warning on strncpy call\n from compile_the_world_in\n\n + JDK-8244287: JFR: Methods samples have line number 0\n\n + JDK-8244703: 'platform encoding not initialized'\n exceptions with debugger, JNI\n\n + JDK-8244719: CTW: C2 compilation fails with\n 'assert(!VerifyHashTableKeys || _hash_lock == 0) failed:\n remove node from hash table before modifying it'\n\n + JDK-8244729: Shenandoah: remove resolve paths from\n SBSA::generate_shenandoah_lrb\n\n + JDK-8244763: Update --release 8 symbol information after\n JSR 337 MR3\n\n + JDK-8244818: Java2D Queue Flusher crash while moving\n application window to external monitor\n\n + JDK-8245151: jarsigner should not raise duplicate\n warnings on verification\n\n + JDK-8245616: Bump update version for OpenJDK: jdk-11.0.9\n\n + JDK-8245714: 'Bad graph detected in build_loop_late'\n when loads are pinned on loop limit check uncommon\n branch\n\n + JDK-8245801: StressRecompilation triggers assert\n 'redundunt OSR recompilation detected. memory leak in\n CodeCache!'\n\n + JDK-8245832: JDK build make-static-libs should build all\n JDK libraries\n\n + JDK-8245880: Shenandoah: check class unloading flag\n early in concurrent code root scan\n\n + JDK-8245981: Upgrade to jQuery 3.5.1\n\n + JDK-8246027: Minimal fastdebug build broken after\n JDK-8245801\n\n + JDK-8246094: [macos] Sound Recording and playback is not\n working\n\n + JDK-8246153: TestEliminateArrayCopy fails with\n\n -XX:+StressReflectiveCode\n\n + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ\n\n + JDK-8246196:\n javax/management/MBeanServer/OldMBeanServerTest fails\n with AssertionError\n\n + JDK-8246203: Segmentation fault in verification due to\n stack overflow with -XX:+VerifyIterativeGVN\n\n + JDK-8246330: Add TLS Tests for Legacy ECDSA curves\n\n + JDK-8246453: TestClone crashes with 'all collected\n exceptions must come from the same place'\n\n + JDK-8247246: Add explicit ResolvedJavaType.link and\n expose presence of default methods\n\n + JDK-8247350: [aarch64] assert(false) failed: wrong size\n of mach node\n\n + JDK-8247502: PhaseStringOpts crashes while optimising\n effectively dead code\n\n + JDK-8247615: Initialize the bytes left for the heap\n sampler\n\n + JDK-8247824: CTW: C2 (Shenandoah) compilation fails with\n SEGV in SBC2Support::pin_and_expand\n\n + JDK-8247874: Replacement in VersionProps.java.template\n not working when --with-vendor-bug-url contains '&'\n\n + JDK-8247979: aarch64: missing side effect of killing\n flags for clearArray_reg_reg\n\n + JDK-8248214: Add paddings for TaskQueueSuper to reduce\n false-sharing cache contention\n\n + JDK-8248219: aarch64: missing memory barrier in\n fast_storefield and fast_accessfield\n\n + JDK-8248348: Regression caused by the update to BCEL 6.0\n\n + JDK-8248385: [testbug][11u] Adapt TestInitiExceptions to\n jtreg 5.1\n\n + JDK-8248495: [macos] zerovm is broken due to libffi\n headers location\n\n + JDK-8248851: CMS: Missing memory fences between free\n chunk check and klass read\n\n + JDK-8248987: AOT's Linker.java seems to eagerly\n fail-fast on Windows\n\n + JDK-8249159: Downport test rework for SSLSocketTemplate\n from 8224650\n\n + JDK-8249215: JFrame::setVisible crashed with\n\n -Dfile.encoding=UTF-8 on Japanese Windows.\n\n + JDK-8249251: [dark_mode ubuntu 20.04] The selected menu\n is not highlighted in GTKLookAndFeel\n\n + JDK-8249255: Build fails if source code in cygwin home\n dir\n\n + JDK-8249277: TestVerifyIterativeGVN.java is failing with\n timeout in OpenJDK 11\n\n + JDK-8249278: Revert JDK-8226253 which breaks the spec of\n AccessibleState.SHOWING for JList\n\n + JDK-8249560: Shenandoah: Fix racy GC request handling\n\n + JDK-8249801: Shenandoah: Clear soft-refs on requested GC\n cycle\n\n + JDK-8249953: Shenandoah: gc/shenandoah/mxbeans tests\n should account for corner cases\n\n + JDK-8250582: Revert Principal Name type to NT-UNKNOWN\n when requesting TGS Kerberos tickets\n\n + JDK-8250609: C2 crash in IfNode::fold_compares\n\n + JDK-8250627: Use -XX:+/-UseContainerSupport for\n enabling/disabling Java container metrics\n\n + JDK-8250755: Better cleanup for\n jdk/test/javax/imageio/plugins/shared/CanWriteSequence.j\n ava\n\n + JDK-8250787: Provider.put no longer registering aliases\n in FIPS env\n\n + JDK-8250826: jhsdb does not work with coredump which\n comes from Substrate VM\n\n + JDK-8250827: Shenandoah: needs to reset/finish\n StringTable's dead count before/after parallel walk\n\n + JDK-8250844: Make sure {type,obj}ArrayOopDesc accessors\n check the bounds\n\n + JDK-8251117: Cannot check P11Key size in P11Cipher and\n P11AEADCipher\n\n + JDK-8251354: Shenandoah: Fix\n jdk/jfr/tool/TestPrintJSON.java test failure\n\n + JDK-8251451: Shenandoah: Remark ObjectSynchronizer roots\n with I-U\n\n + JDK-8251469: Better cleanup for\n test/jdk/javax/imageio/SetOutput.java\n\n + JDK-8251487: Shenandoah: missing detail timing tracking\n for final mark cleaning phase\n\n + JDK-8252120: compiler/oracle/TestCompileCommand.java\n misspells 'occured'\n\n + JDK-8252157: JDK-8231209 11u backport breaks jmm binary\n compatibility\n\n + JDK-8252258: [11u] JDK-8242154 changes the default\n vendor\n\n + JDK-8252804: [test] Fix 'ReleaseDeflater.java' test\n after downport of 8234011\n\n + JDK-8253134: JMM_VERSION should remain at 0x20020000\n (JDK 10) in JDK 11\n\n + JDK-8253283: [11u] Test build/translations/\n /VerifyTranslations.java failing after JDK-8252258\n\n + JDK-8253813: Backout JDK-8244287 from 11u: it causes\n several crashes\n\n + Fix regression '8250861: Crash in\n MinINode::Ideal(PhaseGVN*, bool)' introduced in jdk\n 11.0.9\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1177943\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14779/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14781/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14782/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14792/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14796/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14797/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14798/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14803/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20203359-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2f615d0b\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 :\n\nzypper in -t patch\nSUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-3359=1\n\nSUSE Linux Enterprise Module for Packagehub Subpackages 15-SP1 :\n\nzypper in -t patch\nSUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-3359=1\n\nSUSE Linux Enterprise Module for Basesystem 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2020-3359=1\n\nSUSE Linux Enterprise Module for Basesystem 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2020-3359=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14792\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-11-openjdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-11-openjdk-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-11-openjdk-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-11-openjdk-demo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-11-openjdk-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:java-11-openjdk-headless\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/10/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(1|2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP1/2\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(1|2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP1/2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-11-openjdk-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-11-openjdk-debuginfo-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-11-openjdk-debugsource-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-11-openjdk-demo-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-11-openjdk-devel-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"java-11-openjdk-headless-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-11-openjdk-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-11-openjdk-debuginfo-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-11-openjdk-debugsource-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-11-openjdk-demo-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-11-openjdk-devel-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"java-11-openjdk-headless-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"java-11-openjdk-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"java-11-openjdk-debuginfo-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"java-11-openjdk-debugsource-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"java-11-openjdk-demo-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"java-11-openjdk-devel-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"java-11-openjdk-headless-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"java-11-openjdk-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"java-11-openjdk-debuginfo-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"java-11-openjdk-debugsource-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"java-11-openjdk-demo-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"java-11-openjdk-devel-11.0.9.0-3.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"java-11-openjdk-headless-11.0.9.0-3.48.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"java-11-openjdk\");\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "gentoo": [{"lastseen": "2021-01-25T03:50:36", "bulletinFamily": "unix", "cvelist": ["CVE-2020-14803", "CVE-2020-14782", "CVE-2020-14792", "CVE-2020-2590", "CVE-2020-14781", "CVE-2020-2604", "CVE-2020-2583", "CVE-2020-14798", "CVE-2020-14779", "CVE-2020-2601", "CVE-2020-14797", "CVE-2020-2659", "CVE-2020-2593", "CVE-2020-14796", "CVE-2020-2654"], "description": "### Background\n\nOpenJDK is a free and open-source implementation of the Java Platform, Standard Edition. \n\n### Description\n\nMultiple vulnerabilities have been discovered in OpenJDK. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nPlease review the referenced CVE identifiers for details.\n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll OpenJDK users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-java/openjdk-8.272_p10\"\n \n\nAll OpenJDK (binary) users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-java/openjdk-bin-8.272_p10\"\n \n\nAll OpenJDK JRE (binary) users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=dev-java/openjdk-jre-bin-8.272_p10\"", "edition": 1, "modified": "2021-01-25T00:00:00", "published": "2021-01-25T00:00:00", "id": "GLSA-202101-19", "href": "https://security.gentoo.org/glsa/202101-19", "title": "OpenJDK: Multiple vulnerabilities", "type": "gentoo", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2020-11-13T03:15:06", "bulletinFamily": "unix", "cvelist": ["CVE-2020-14803", "CVE-2020-14782", "CVE-2020-14792", "CVE-2020-14781", "CVE-2020-14798", "CVE-2020-14779", "CVE-2020-14797", "CVE-2020-14796"], "description": "USN-4607-1 fixed vulnerabilities and added features in OpenJDK. \nUnfortunately, that update introduced a regression that could cause TLS \nconnections with client certificate authentication to fail in some \nsituations. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nIt was discovered that OpenJDK incorrectly handled deserializing Proxy \nclass objects with many interfaces. A remote attacker could possibly use \nthis issue to cause a denial of service (memory consumption) via a \nspecially crafted input. (CVE-2020-14779)\n\nSergey Ostanin discovered that OpenJDK incorrectly restricted \nauthentication mechanisms. A remote attacker could possibly use this \nissue to obtain sensitive information over an unencrypted connection. \n(CVE-2020-14781)\n\nIt was discovered that OpenJDK incorrectly handled untrusted certificates. \nAn attacker could possibly use this issue to read or write sensitive \ninformation. (CVE-2020-14782)\n\nZhiqiang Zang discovered that OpenJDK incorrectly checked for integer \noverflows. An attacker could possibly use this issue to bypass certain \nJava sandbox restrictions. (CVE-2020-14792)\n\nMarkus Loewe discovered that OpenJDK incorrectly checked permissions when \nconverting a file system path to an URI. An attacker could possibly use \nthis issue to bypass certain Java sandbox restrictions. (CVE-2020-14796)\n\nMarkus Loewe discovered that OpenJDK incorrectly checked for invalid \ncharacters when converting an URI to a path. An attacker could possibly \nuse this issue to read or write sensitive information. (CVE-2020-14797)\n\nMarkus Loewe discovered that OpenJDK incorrectly checked the length of \ninput strings. An attacker could possibly use this issue to bypass certain \nJava sandbox restrictions. (CVE-2020-14798)\n\nIt was discovered that OpenJDK incorrectly handled boundary checks. An \nattacker could possibly use this issue to bypass certain Java sandbox \nrestrictions. (CVE-2020-14803)", "edition": 1, "modified": "2020-11-12T00:00:00", "published": "2020-11-12T00:00:00", "id": "USN-4607-2", "href": "https://ubuntu.com/security/notices/USN-4607-2", "title": "OpenJDK regressions", "type": "ubuntu", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}]}