First published: Tue Jan 14 2020(Updated: )
A flaw was discovered in the way the Libraries component of OpenJDK processed X.509 certificates. Values of Object Identifiers (OIDs) were "interned", possibly allowing a malicious X.509 certificate to trigger excessive memory usage in a Java application processing such certificate.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.8.0-openjdk-1:1.8.0.242.b07-1.el6_10 | 1.8.0-openjdk-1:1.8.0.242.b07-1.el6_10 |
redhat/java | <1.7.0-openjdk-1:1.7.0.251-2.6.21.0.el6_10 | 1.7.0-openjdk-1:1.7.0.251-2.6.21.0.el6_10 |
redhat/java | <1.7.1-ibm-1:1.7.1.4.65-1jpp.1.el6_10 | 1.7.1-ibm-1:1.7.1.4.65-1jpp.1.el6_10 |
redhat/java | <1.8.0-ibm-1:1.8.0.6.10-1jpp.1.el6_10 | 1.8.0-ibm-1:1.8.0.6.10-1jpp.1.el6_10 |
redhat/java | <11-openjdk-1:11.0.6.10-1.el7_7 | 11-openjdk-1:11.0.6.10-1.el7_7 |
redhat/java | <1.8.0-openjdk-1:1.8.0.242.b08-0.el7_7 | 1.8.0-openjdk-1:1.8.0.242.b08-0.el7_7 |
redhat/java | <1.7.0-openjdk-1:1.7.0.251-2.6.21.0.el7_7 | 1.7.0-openjdk-1:1.7.0.251-2.6.21.0.el7_7 |
redhat/java | <1.8.0-ibm-1:1.8.0.6.10-1jpp.1.el7 | 1.8.0-ibm-1:1.8.0.6.10-1jpp.1.el7 |
redhat/java | <1.7.1-ibm-1:1.7.1.4.65-1jpp.1.el7 | 1.7.1-ibm-1:1.7.1.4.65-1jpp.1.el7 |
redhat/java | <11-openjdk-1:11.0.6.10-0.el8_1 | 11-openjdk-1:11.0.6.10-0.el8_1 |
redhat/java | <1.8.0-openjdk-1:1.8.0.242.b08-0.el8_1 | 1.8.0-openjdk-1:1.8.0.242.b08-0.el8_1 |
redhat/java | <1.8.0-ibm-1:1.8.0.6.10-1.el8_2 | 1.8.0-ibm-1:1.8.0.6.10-1.el8_2 |
redhat/java | <1.8.0-openjdk-1:1.8.0.242.b08-0.el8_0 | 1.8.0-openjdk-1:1.8.0.242.b08-0.el8_0 |
redhat/java | <11-openjdk-1:11.0.6.10-0.el8_0 | 11-openjdk-1:11.0.6.10-0.el8_0 |
IBM Security Identity Manager Virtual Appliance | <=7.0.2 | |
IBM Security Identity Manager Virtual Appliance | <=7.0.1 | |
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.25~5ea-1 | |
debian/openjdk-8 | 8u422-b05-1 | |
Oracle JDK 6 | =1.7.0-update241 | |
Oracle JDK 6 | =1.8.0-update231 | |
Oracle JDK 6 | =11.0.5 | |
Oracle JDK 6 | =13.0.1 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update_241 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update_231 | |
Oracle Java Runtime Environment (JRE) | =11.0.5 | |
Oracle Java Runtime Environment (JRE) | =13.0.1 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =7.7 | |
redhat enterprise Linux eus | =8.1 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
OpenJDK 17 | =7 | |
OpenJDK 17 | =7-update241 | |
OpenJDK 17 | =7-update80 | |
OpenJDK 17 | =7-update85 | |
OpenJDK 17 | =8 | |
OpenJDK 17 | =8-update102 | |
OpenJDK 17 | =8-update112 | |
OpenJDK 17 | =8-update152 | |
OpenJDK 17 | =8-update162 | |
OpenJDK 17 | =8-update172 | |
OpenJDK 17 | =8-update192 | |
OpenJDK 17 | =8-update20 | |
OpenJDK 17 | =8-update202 | |
OpenJDK 17 | =8-update212 | |
OpenJDK 17 | =8-update222 | |
OpenJDK 17 | =8-update232 | |
OpenJDK 17 | =8-update40 | |
OpenJDK 17 | =8-update60 | |
OpenJDK 17 | =8-update66 | |
OpenJDK 17 | =8-update72 | |
OpenJDK 17 | =8-update92 | |
OpenJDK 17 | =11 | |
OpenJDK 17 | =11.0.1 | |
OpenJDK 17 | =11.0.2 | |
OpenJDK 17 | =11.0.3 | |
OpenJDK 17 | =11.0.4 | |
OpenJDK 17 | =11.0.5 | |
OpenJDK 17 | =13 | |
OpenJDK 17 | =13.0.1 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.10 | |
netapp active iq unified manager windows | >=7.3 | |
NetApp Active IQ Unified Manager for VMware vSphere | >=9.5 | |
netapp e-series performance analyzer | ||
NetApp E-Series SANtricity Management Plug-ins for VMware vCenter | ||
NetApp E-Series SANtricity OS Controller | >=11.0.0<=11.60.1 | |
netapp e-series santricity storage manager | ||
NetApp E-Series SANtricity Web Services Proxy | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
netapp santricity unified manager | ||
NetApp SteelStore | ||
Trellix ePolicy Orchestrator | =5.9.0 | |
Trellix ePolicy Orchestrator | =5.9.1 | |
Trellix ePolicy Orchestrator | =5.10.0 | |
Trellix ePolicy Orchestrator | =5.10.0-update_1 | |
Trellix ePolicy Orchestrator | =5.10.0-update_2 | |
Trellix ePolicy Orchestrator | =5.10.0-update_3 | |
Trellix ePolicy Orchestrator | =5.10.0-update_4 | |
Trellix ePolicy Orchestrator | =5.10.0-update_5 | |
Trellix ePolicy Orchestrator | =5.10.0-update_6 | |
openSUSE | =15.1 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-2654 has been assigned a medium severity rating, as it can lead to excessive memory usage in affected Java applications.
To fix CVE-2020-2654, update your Java installations to the advised patched versions provided by Red Hat or Oracle.
CVE-2020-2654 affects several versions of OpenJDK and IBM JDK, including 1.7, 1.8, and 11 across various distributions.
CVE-2020-2654 can be exploited by maliciously crafted X.509 certificates that lead to denial of service through memory exhaustion.
There are no recommended workarounds for CVE-2020-2654; updating to a secure version is the advised preventive measure.