Lucene search

K
suseSuseOPENSUSE-SU-2020:0841-1
HistoryJun 24, 2020 - 12:00 a.m.

Security update for java-1_8_0-openj9 (important)

2020-06-2400:00:00
lists.opensuse.org
54

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.004 Low

EPSS

Percentile

72.2%

An update that fixes 10 vulnerabilities is now available.

Description:

This update for java-1_8_0-openj9 fixes the following issues:

java-1_8_0-openj9 was updated to Java 8.0 Service Refresh 6 Fix Pack 10
(bsc#1169511)

  • CVE-2020-2830: Improved Scanner conversions
  • CVE-2020-2805: Enhanced typing of methods
  • CVE-2020-2803: Enhanced buffering of byte buffers
  • CVE-2020-2800: Improved Headings for HTTP Servers
  • CVE-2020-2781: Improved TLS session handling
  • CVE-2020-2773: Fixed an issue which could have allowed an attacker to
    caise denial of service
  • CVE-2020-2757: Less Blocking Array Queues
  • CVE-2020-2756: Improved mapping of serial ENUMs
  • CVE-2020-2755: Improved Nashorn matching
  • CVE-2020-2754: Forwarded references to Nashorn
  • The pack200 and unpack200 alternatives should be slaves of java
    (bsc#1171352).

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.2:

    zypper in -t patch openSUSE-2020-841=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.2noarch< - openSUSE Leap 15.2 (noarch):- openSUSE Leap 15.2 (noarch):.noarch.rpm
openSUSE Leap15.2x86_64< - openSUSE Leap 15.2 (x86_64):- openSUSE Leap 15.2 (x86_64):.x86_64.rpm

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.004 Low

EPSS

Percentile

72.2%